First published: Tue Jul 09 2024(Updated: )
Elements of PDCE does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This allows an attacker to read sensitive information causing high impact on the confidentiality of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP S/4HANA (SAP S4fnd, SAP S4core) | =102 | |
SAP S/4HANA (SAP S4fnd, SAP S4core) | =103 | |
SAP S/4HANA | =104 | |
SAP S/4HANA | =105 | |
SAP S/4HANA | =106 | |
SAP S/4HANA | =107 | |
SAP S/4HANA | =108 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39592 has a high severity rating due to its potential to allow unauthorized access to sensitive information.
To mitigate CVE-2024-39592, apply the latest security patches provided by SAP for the affected versions.
CVE-2024-39592 affects SAP S4Core versions 102 and 103, as well as SAP S4CoreOP versions 104 through 108.
Yes, CVE-2024-39592 can be exploited by authenticated users, allowing them to escalate privileges and access sensitive data.
CVE-2024-39592 significantly impacts confidentiality by enabling attackers to read sensitive information without proper authorization.