Sap Solution Manager vulnerabilities

32 known vulnerabilities affecting sap/solution_manager.

Total CVEs
32
CISA KEV
1
actively exploited
Public exploits
2
Exploited in wild
1
Severity breakdown
CRITICAL8HIGH9MEDIUM14LOW1

Vulnerabilities

Page 1 of 2
CVE-2023-49587MEDIUMCVSS 6.4v7202023-12-12
CVE-2023-49587 [MEDIUM] CWE-77 CVE-2023-49587: SAP Solution Manager - version 720, allows an authorized attacker to execute certain deprecated func SAP Solution Manager - version 720, allows an authorized attacker to execute certain deprecated function modules which can read or modify data of same or other component without user interaction over the network.
nvd
CVE-2023-36925HIGHCVSS 7.2v7.202023-07-11
CVE-2023-36925 [HIGH] CWE-918 CVE-2023-36925: SAP Solution Manager (Diagnostics agent) - version 7.20, allows an unauthenticated attacker to blind SAP Solution Manager (Diagnostics agent) - version 7.20, allows an unauthenticated attacker to blindly execute HTTP requests. On successful exploitation, the attacker can cause a limited impact on confidentiality and availability of the application and other applications the Diagnostics Agent can reach.
nvd
CVE-2023-36921HIGHCVSS 7.2v7.202023-07-11
CVE-2023-36921 [HIGH] CWE-644 CVE-2023-36921: SAP Solution Manager (Diagnostics agent) - version 7.20, allows an attacker to tamper with headers i SAP Solution Manager (Diagnostics agent) - version 7.20, allows an attacker to tamper with headers in a client request. This misleads SAP Diagnostics Agent to serve poisoned content to the server. On successful exploitation, the attacker can cause a limited impact on confidentiality and availability of the application.
nvd
CVE-2023-27893HIGHCVSS 8.8v7402023-03-14
CVE-2023-27893 [HIGH] CWE-94 CVE-2023-27893: An attacker authenticated as a user with a non-administrative role and a common remote execution aut An attacker authenticated as a user with a non-administrative role and a common remote execution authorization in SAP Solution Manager and ABAP managed systems (ST-PI) - versions 2088_1_700, 2008_1_710, 740, can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. Depend
nvd
CVE-2023-0025MEDIUMCVSS 5.4v7202023-02-14
CVE-2023-0025 [MEDIUM] CWE-79 CVE-2023-0025: SAP Solution Manager (BSP Application) - version 720, allows an authenticated attacker to craft a ma SAP Solution Manager (BSP Application) - version 720, allows an authenticated attacker to craft a malicious link, which when clicked by an unsuspecting user, can be used to read or modify some sensitive information or craft a payload which may restrict access to the desired resources.
nvd
CVE-2023-23855MEDIUMCVSS 5.4v7202023-02-14
CVE-2023-23855 [MEDIUM] CWE-601 CVE-2023-23855: SAP Solution Manager - version 720, allows an authenticated attacker to redirect users to a maliciou SAP Solution Manager - version 720, allows an authenticated attacker to redirect users to a malicious site due to insufficient URL validation. A successful attack could lead an attacker to read or modify the information or expose the user to a phishing attack. As a result, it has a low impact to confidentiality, integrity and availability.
cvelistv5nvd
CVE-2023-23852MEDIUMCVSS 6.1v7202023-02-14
CVE-2023-23852 [MEDIUM] CWE-79 CVE-2023-23852: SAP Solution Manager (System Monitoring) - version 720, does not sufficiently encode user-controlled SAP Solution Manager (System Monitoring) - version 720, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
cvelistv5nvd
CVE-2023-0024MEDIUMCVSS 5.4v7202023-02-14
CVE-2023-0024 [MEDIUM] CWE-79 CVE-2023-0024: SAP Solution Manager (BSP Application) - version 720, allows an authenticated attacker to craft a ma SAP Solution Manager (BSP Application) - version 720, allows an authenticated attacker to craft a malicious link, which when clicked by an unsuspecting user, can be used to read or modify some sensitive information or craft a payload which may restrict access to the desired resources, resulting in Cross-Site Scripting vulnerability.
nvd
CVE-2022-41275MEDIUMCVSS 6.1v740v7502022-12-13
CVE-2022-41275 [MEDIUM] CWE-601 CVE-2022-41275: In SAP Solution Manager (Enterprise Search) - versions 740, and 750, an unauthenticated attacker can In SAP Solution Manager (Enterprise Search) - versions 740, and 750, an unauthenticated attacker can generate a link that, if clicked by a logged-in user, can be redirected to a malicious page that could read or modify sensitive information, or expose the user to a phishing attack, with little impact on confidentiality and integrity.
nvd
CVE-2022-41261MEDIUMCVSS 5.5v7.202022-12-12
CVE-2022-41261 [MEDIUM] CWE-284 CVE-2022-41261: SAP Solution Manager (Diagnostic Agent) - version 7.20, allows an authenticated attacker on Windows SAP Solution Manager (Diagnostic Agent) - version 7.20, allows an authenticated attacker on Windows system to access a file containing sensitive data which can be used to access a configuration file which contains credentials to access other system files. Successful exploitation can make the attacker access files and systems for which he/she is not a
nvd
CVE-2022-22544CRITICALCVSS 9.1v7.202022-02-09
CVE-2022-22544 [CRITICAL] CVE-2022-22544: Solution Manager (Diagnostics Root Cause Analysis Tools) - version 720, allows an administrator to e Solution Manager (Diagnostics Root Cause Analysis Tools) - version 720, allows an administrator to execute code on all connected Diagnostics Agents and browse files on their systems. An attacker could thereby control the managed systems. It is considered that this is a missing segregation of duty for the SAP Solution Manager administrator. Impacts of unau
nvd
CVE-2021-21483MEDIUMCVSS 4.9v7.202021-04-13
CVE-2021-21483 [MEDIUM] CVE-2021-21483: Under certain conditions SAP Solution Manager, version - 720, allows a high privileged attacker to g Under certain conditions SAP Solution Manager, version - 720, allows a high privileged attacker to get access to sensitive information which has a direct serious impact beyond the exploitable component thereby affecting the confidentiality in the application.
nvd
CVE-2020-26837CRITICALCVSS 9.1v7.202020-12-09
CVE-2020-26837 [CRITICAL] CWE-22 CVE-2020-26837: SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user t SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially co
nvd
CVE-2020-26830HIGHCVSS 8.1v7.202020-12-09
CVE-2020-26830 [HIGH] CWE-862 CVE-2020-26830: SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, does not perform necessary aut SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, does not perform necessary authorization checks for an authenticated user. Due to inadequate access control, a network attacker authenticated as a regular user can use operations which should be restricted to administrators. These operations can be used to Change the User Experience
nvd
CVE-2020-26836MEDIUMCVSS 6.1PoCv7.202020-12-09
CVE-2020-26836 [MEDIUM] CWE-601 CVE-2020-26836: SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the applic SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who c
nvd
CVE-2020-26823CRITICALCVSS 10.0v7.202020-11-10
CVE-2020-26823 [CRITICAL] CWE-306 CVE-2020-26823: SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Diagnostics Agent Connection Service, this has an impact to the integrity and availability of the service.
nvd
CVE-2020-26824CRITICALCVSS 10.0v7.202020-11-10
CVE-2020-26824 [CRITICAL] CWE-306 CVE-2020-26824: SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Legacy Ports Service, this has an impact to the integrity and availability of the service.
nvd
CVE-2020-26822CRITICALCVSS 10.0v7.202020-11-10
CVE-2020-26822 [CRITICAL] CWE-306 CVE-2020-26822: SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Outside Discovery Configuration Service, this has an impact to the integrity and availability of the service.
nvd
CVE-2020-26821CRITICALCVSS 10.0v7.202020-11-10
CVE-2020-26821 [CRITICAL] CWE-306 CVE-2020-26821: SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the SVG Converter Service, this has an impact to the integrity and availability of the service.
nvd
CVE-2020-6369MEDIUMCVSS 5.9v9.7v10.1+2 more2020-10-20
CVE-2020-6369 [MEDIUM] CVE-2020-6369: SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service.
nvd