Vulnerability Details : CVE-2023-24524
SAP S/4 HANA Map Treasury Correspondence Format Data does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. This could allow an attacker to delete the data with a high impact to availability.
Products affected by CVE-2023-24524
- cpe:2.3:a:sap:s\/4hana:104:*:*:*:*:*:*:*
- cpe:2.3:a:sap:s\/4hana:105:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-24524
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-24524
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
SAP SE | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2023-24524
-
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.Assigned by: cna@sap.com (Primary)
References for CVE-2023-24524
-
https://launchpad.support.sap.com/#/notes/2985905
SAP ONE Support Launchpad: Log OnPermissions Required;Vendor Advisory
-
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
SAP Patch Day BlogVendor Advisory
Jump to