First published: Tue Jan 14 2025(Updated: )
SAP GUI for Windows stores user input on the client PC to improve usability. Under very specific circumstances an attacker with administrative privileges or access to the victim�s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP GUI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0055 has a medium severity rating due to its potential impact on user data confidentiality.
To fix CVE-2025-0055, ensure that you are using the latest version of SAP GUI for Windows, which includes security updates addressing this vulnerability.
CVE-2025-0055 affects users of SAP GUI for Windows who allow administrative access or who have shared their user directories.
CVE-2025-0055 can expose sensitive user input data stored on the client PC, dependent on specific usage patterns.
CVE-2025-0055 cannot be exploited remotely and requires local access to the user's operating system to retrieve the vulnerable data.