First published: Tue Aug 13 2024(Updated: )
SAP Shared Service Framework does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. On successful exploitation, an attacker can cause a high impact on confidentiality of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Shared Service Framework | =sap_bs_fnd_702 | |
SAP Shared Service Framework | =sap_bs_fnd_731 | |
SAP Shared Service Framework | =sap_bs_fnd_746 | |
SAP Shared Service Framework | =sap_bs_fnd_747 | |
SAP Shared Service Framework | =sap_bs_fnd_748 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42376 is classified as a high severity vulnerability due to the potential for privilege escalation.
To fix CVE-2024-42376, ensure that you apply the latest security patches provided by SAP for the affected versions of the Shared Service Framework.
CVE-2024-42376 affects SAP Shared Service Framework versions sap_bs_fnd_702, sap_bs_fnd_731, sap_bs_fnd_746, sap_bs_fnd_747, and sap_bs_fnd_748.
The impact of CVE-2024-42376 is high as it allows authenticated users to escalate their privileges, compromising the application's confidentiality.
Yes, an attacker with authenticated access can exploit CVE-2024-42376 to escalate privileges within the application.