First published: Tue Jan 14 2025(Updated: )
SAP GUI for Java saves user input on the client PC to improve usability. An attacker with administrative privileges or access to the victim�s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP GUI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0056 has a moderate severity level due to the potential for unauthorized data access.
To mitigate CVE-2025-0056, ensure that proper access controls are implemented to restrict access to user directories.
CVE-2025-0056 specifically affects the SAP GUI for Java.
Yes, CVE-2025-0056 allows attackers with access to the user directory to potentially read sensitive user input.
To prevent exploitation of CVE-2025-0056, regularly review and tighten user permissions and monitor access logs.