7.8

CVE-2020-6244

SAP Business Client, version 7.0, allows an attacker after a successful social engineering attack to inject malicious code as a DLL file in untrusted directories that can be executed by the application, due to uncontrolled search path element. An attacker could thereby control the behavior of the application.

Data is provided by the National Vulnerability Database (NVD)
SAPBusiness Client Version6.0 Update-
SAPBusiness Client Version6.0 Updatepatch_level1
SAPBusiness Client Version6.0 Updatepatch_level10
SAPBusiness Client Version6.0 Updatepatch_level11
SAPBusiness Client Version6.0 Updatepatch_level12
SAPBusiness Client Version6.0 Updatepatch_level13
SAPBusiness Client Version6.0 Updatepatch_level14
SAPBusiness Client Version6.0 Updatepatch_level15
SAPBusiness Client Version6.0 Updatepatch_level16
SAPBusiness Client Version6.0 Updatepatch_level17
SAPBusiness Client Version6.0 Updatepatch_level2
SAPBusiness Client Version6.0 Updatepatch_level3
SAPBusiness Client Version6.0 Updatepatch_level4
SAPBusiness Client Version6.0 Updatepatch_level5
SAPBusiness Client Version6.0 Updatepatch_level6
SAPBusiness Client Version6.0 Updatepatch_level7
SAPBusiness Client Version6.0 Updatepatch_level8
SAPBusiness Client Version6.0 Updatepatch_level9
SAPBusiness Client Version6.5 Update-
SAPBusiness Client Version6.5 Updatepatch_level1
SAPBusiness Client Version6.5 Updatepatch_level10
SAPBusiness Client Version6.5 Updatepatch_level11
SAPBusiness Client Version6.5 Updatepatch_level12
SAPBusiness Client Version6.5 Updatepatch_level13
SAPBusiness Client Version6.5 Updatepatch_level14
SAPBusiness Client Version6.5 Updatepatch_level15
SAPBusiness Client Version6.5 Updatepatch_level16
SAPBusiness Client Version6.5 Updatepatch_level17
SAPBusiness Client Version6.5 Updatepatch_level18
SAPBusiness Client Version6.5 Updatepatch_level19
SAPBusiness Client Version6.5 Updatepatch_level2
SAPBusiness Client Version6.5 Updatepatch_level20
SAPBusiness Client Version6.5 Updatepatch_level21
SAPBusiness Client Version6.5 Updatepatch_level22
SAPBusiness Client Version6.5 Updatepatch_level3
SAPBusiness Client Version6.5 Updatepatch_level4
SAPBusiness Client Version6.5 Updatepatch_level5
SAPBusiness Client Version6.5 Updatepatch_level6
SAPBusiness Client Version6.5 Updatepatch_level7
SAPBusiness Client Version6.5 Updatepatch_level8
SAPBusiness Client Version6.5 Updatepatch_level9
SAPBusiness Client Version7.0 Update-
SAPBusiness Client Version7.0 Updatepatch_level1
SAPBusiness Client Version7.0 Updatepatch_level2
SAPBusiness Client Version7.0 Updatepatch_level3
SAPBusiness Client Version7.0 Updatepatch_level4
SAPBusiness Client Version7.0 Updatepatch_level5
SAPBusiness Client Version7.0 Updatepatch_level6
SAPBusiness Client Version7.0 Updatepatch_level7
SAPBusiness Client Version7.0 Updatepatch_level8
SAPBusiness Client Version7.0 Updatepatch_level9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.07% 0.187
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 4.4 3.4 6.4
AV:L/AC:M/Au:N/C:P/I:P/A:P
cna@sap.com 7 1 5.9
CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-427 Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.