First published: Tue Feb 13 2024(Updated: )
SAP IDES ECC-systems contain code that permits the execution of arbitrary program code of user's choice.An attacker can therefore control the behaviour of the system by executing malicious code which can potentially escalate privileges with low impact on confidentiality, integrity and availability of the system.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP IDES ECC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-22132 is categorized as low due to its minimal impact on confidentiality, integrity, and availability.
To mitigate CVE-2024-22132, SAP recommends applying the latest security patches and updates to the IDES ECC system.
CVE-2024-22132 allows an attacker to execute arbitrary program code, potentially leading to privilege escalation.
CVE-2024-22132 affects SAP IDES ECC systems specifically.
Exploitation of CVE-2024-22132 allows attackers to control the system behavior with low impact on data confidentiality and integrity.