CVE-2022-35293
Published on: Not Yet Published
Last Modified on: 08/15/2022 12:17:00 PM UTC
Certain versions of Enable Now Manager from Sap contain the following vulnerability:
Due to insecure session management, SAP Enable Now allows an unauthenticated attacker to gain access to user's account. On successful exploitation, an attacker can view or modify user data causing limited impact on confidentiality and integrity of the application.
- CVE-2022-35293 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
- Affected Vendor/Software:
SAP SE - SAP Enable Now Manager version = 1.0
CVSS3 Score: 9.1 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | launchpad.support.sap.com text/html |
![]() |
SAP Patch Day Blog | web.archive.org text/html Inactive LinkNot Archived |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Sap | Enable Now Manager | 1.0 | All | All | All |
- cpe:2.3:a:sap:enable_now_manager:1.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-35293 : Due to insecure session management, #SAP Enable Now allows an unauthenticated attacker to gain acc… twitter.com/i/web/status/1… | 2022-08-10 20:23:05 |