Vulnerability Details : CVE-2020-6320
SAP Marketing (Servlet), version-130,140,150, allows an authenticated attacker to invoke certain functions that are restricted. Limited knowledge of payload is required for an attacker to exploit the vulnerability and perform tasks related to contact and interaction data which impacts Confidentiality and Integrity of data in the application.
Products affected by CVE-2020-6320
- cpe:2.3:a:sap:marketing:130:*:*:*:*:*:*:*
- cpe:2.3:a:sap:marketing:140:*:*:*:*:*:*:*
- cpe:2.3:a:sap:marketing:150:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-6320
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 27 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-6320
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:N |
8.0
|
4.9
|
NIST | |
9.6
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N |
3.1
|
5.8
|
SAP SE | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
2.8
|
5.2
|
NIST |
References for CVE-2020-6320
-
https://launchpad.support.sap.com/#/notes/2961991
SAP ONE Support Launchpad: Log OnPermissions Required
-
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700
SAP Security Patch Day – September 2020 - Product Security Response at SAP - Community WikiVendor Advisory
Jump to