Vulnerability Details : CVE-2018-2494
Necessary authorization checks for an authenticated user, resulting in escalation of privileges, have been fixed in SAP Basis AS ABAP of SAP NetWeaver 700 to 750, from 750 onwards delivered as ABAP Platform.
Products affected by CVE-2018-2494
- SAP » Business Application Software Integrated SolutionVersions from including (>=) 7.10 and up to, including, (<=) 7.30cpe:2.3:a:sap:business_application_software_integrated_solution:*:*:*:*:*:*:*:*
- SAP » Business Application Software Integrated SolutionVersions from including (>=) 7.50 and up to, including, (<=) 7.53cpe:2.3:a:sap:business_application_software_integrated_solution:*:*:*:*:*:*:*:*
- SAP » Business Application Software Integrated SolutionVersions from including (>=) 7.00 and up to, including, (<=) 7.02cpe:2.3:a:sap:business_application_software_integrated_solution:*:*:*:*:*:*:*:*
- cpe:2.3:a:sap:business_application_software_integrated_solution:7.31:*:*:*:*:*:*:*
- cpe:2.3:a:sap:business_application_software_integrated_solution:7.40:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-2494
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-2494
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.0
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
2.1
|
5.9
|
NIST |
CWE ids for CVE-2018-2494
-
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-2494
-
https://launchpad.support.sap.com/#/notes/2698996
SAP ONE Support Launchpad: Log OnPermissions Required;Vendor Advisory
-
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699
SAP Security Patch Day – December 2018 - Product Security Response at SAP - SCN WikiVendor Advisory
Jump to