First published: Tue Jul 09 2024(Updated: )
SAP CRM WebClient does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. This could allow an attacker to access some sensitive information.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Customer Relationship Management S4fnd | =102 | |
Sap Customer Relationship Management S4fnd | =103 | |
Sap Customer Relationship Management S4fnd | =104 | |
Sap Customer Relationship Management S4fnd | =105 | |
Sap Customer Relationship Management S4fnd | =106 | |
Sap Customer Relationship Management S4fnd | =107 | |
Sap Customer Relationship Management S4fnd | =108 | |
Sap Customer Relationship Management Webclient Ui | =701 | |
Sap Customer Relationship Management Webclient Ui | =731 | |
Sap Customer Relationship Management Webclient Ui | =746 | |
Sap Customer Relationship Management Webclient Ui | =747 | |
Sap Customer Relationship Management Webclient Ui | =748 | |
Sap Customer Relationship Management Webclient Ui | =800 | |
Sap Customer Relationship Management Webclient Ui | =801 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37175 has a high severity due to unauthorized access and privilege escalation risks.
To fix CVE-2024-37175, apply the latest security patches provided by SAP for the affected versions.
CVE-2024-37175 affects several versions of SAP Customer Relationship Management, including versions 102 through 108, and the WebClient UI versions 701 through 801.
CVE-2024-37175 is a privilege escalation vulnerability due to inadequate authorization checks for authenticated users.
Yes, CVE-2024-37175 can allow attackers to access sensitive information through unauthorized privilege escalation.