Vulnerability Description
SAP GUI allows an authenticated attacker to execute scripts in the local network. On successful exploitation, the attacker can gain access to registries which can cause a limited impact on confidentiality and high impact on availability of the application.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Gui | 7.70 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://launchpad.support.sap.com/#/notes/3237251Permissions RequiredVendor Advisory
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.htmlVendor Advisory
- https://launchpad.support.sap.com/#/notes/3237251Permissions RequiredVendor Advisory
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.htmlVendor Advisory
FAQ
What is CVE-2022-41205?
CVE-2022-41205 is a vulnerability with a CVSS score of 5.5 (MEDIUM). SAP GUI allows an authenticated attacker to execute scripts in the local network. On successful exploitation, the attacker can gain access to registries which can cause a limited impact on confidentia...
How severe is CVE-2022-41205?
CVE-2022-41205 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-41205?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Gui, Microsoft Windows.