Vulnerability Details : CVE-2020-26810
SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request can render the SAP Commerce service itself unavailable leading to Denial of Service with no impact on confidentiality or integrity.
Vulnerability category: Denial of service
Products affected by CVE-2020-26810
- cpe:2.3:a:sap:commerce_cloud_\(accelerator_payment_mock\):1808:*:*:*:*:*:*:*
- cpe:2.3:a:sap:commerce_cloud_\(accelerator_payment_mock\):1811:*:*:*:*:*:*:*
- cpe:2.3:a:sap:commerce_cloud_\(accelerator_payment_mock\):1905:*:*:*:*:*:*:*
- cpe:2.3:a:sap:commerce_cloud_\(accelerator_payment_mock\):2005:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-26810
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-26810
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
SAP SE | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
References for CVE-2020-26810
-
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571
SAP Security Patch Day – November 2020 - Product Security Response at SAP - Community WikiVendor Advisory
-
https://launchpad.support.sap.com/#/notes/2975170
SAP ONE Support Launchpad: Log OnPermissions Required
Jump to