2023-05-09 06:00:27 +02:00
{
"id" : "CVE-2023-32113" ,
"sourceIdentifier" : "cna@sap.com" ,
"published" : "2023-05-09T02:15:12.873" ,
2024-03-20 15:04:07 +00:00
"lastModified" : "2024-03-19T19:48:16.700" ,
2023-05-15 20:00:27 +02:00
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-05-09 06:00:27 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "SAP GUI for Windows - version 7.70, 8.0, allows an unauthorized attacker to gain NTLM authentication information of a victim by tricking it into clicking a prepared shortcut file. Depending on the authorizations of the victim, the attacker can read and modify potentially sensitive information after successful exploitation.\n\n"
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-05-15 20:00:27 +02:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 9.3 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.8
} ,
2023-05-09 06:00:27 +02:00
{
"source" : "cna@sap.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" ,
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.8
}
]
} ,
"weaknesses" : [
{
"source" : "cna@sap.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-200"
}
]
}
] ,
2023-05-15 20:00:27 +02:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
2024-03-20 15:04:07 +00:00
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "7.70" ,
"matchCriteriaId" : "44424F57-EDAC-42EE-8C29-F9AA09301A46"
} ,
2023-05-15 20:00:27 +02:00
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE1286F1-B9A5-4F25-B083-272943D90023"
} ,
2024-03-20 15:04:07 +00:00
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:patch_level1:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF605CA1-E860-4185-A358-FE967E0DE408"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:patch_level10:*:*:*:*:*:*" ,
"matchCriteriaId" : "5D569EBA-CE95-436E-BB48-D2EF55DD9D30"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:patch_level11:*:*:*:*:*:*" ,
"matchCriteriaId" : "A81A5609-2ADD-4714-8783-27BC417346D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:patch_level2:*:*:*:*:*:*" ,
"matchCriteriaId" : "181183AC-5621-4895-82E1-E91D9DCAB69A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:patch_level3:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD057E0A-C836-46ED-ACB3-1C80CECACD60"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:patch_level4:*:*:*:*:*:*" ,
"matchCriteriaId" : "2AEA7D81-E487-4B85-81FF-338E2C48D282"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:patch_level5:*:*:*:*:*:*" ,
"matchCriteriaId" : "4114FB5F-DE93-4C1F-80E2-08ADC51BC2B1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:patch_level6:*:*:*:*:*:*" ,
"matchCriteriaId" : "F65D7775-75DC-4F88-AC76-C4EEC59A2DE4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:patch_level7:*:*:*:*:*:*" ,
"matchCriteriaId" : "02EC1177-F290-4488-B365-F107A7CBBA09"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:patch_level8:*:*:*:*:*:*" ,
"matchCriteriaId" : "532B87F7-19BF-4956-A0A6-4F76755EF1F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:7.70:patch_level9:*:*:*:*:*:*" ,
"matchCriteriaId" : "662D074A-F79A-4936-925E-54C7DDC45BB4"
} ,
2023-05-15 20:00:27 +02:00
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:8.0:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "A69E51CD-C3D1-4B66-94AA-45B2A848912C"
2024-03-20 15:04:07 +00:00
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:gui_for_windows:8.0:patch_level1:*:*:*:*:*:*" ,
"matchCriteriaId" : "6E736149-FB18-47E7-B6DA-6459D4AC235D"
2023-05-15 20:00:27 +02:00
}
]
}
]
}
] ,
2023-05-09 06:00:27 +02:00
"references" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/3320467" ,
2023-05-15 20:00:27 +02:00
"source" : "cna@sap.com" ,
"tags" : [
"Permissions Required" ,
"Vendor Advisory"
]
2023-05-09 06:00:27 +02:00
} ,
{
"url" : "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" ,
2023-05-15 20:00:27 +02:00
"source" : "cna@sap.com" ,
"tags" : [
"Vendor Advisory"
]
2023-05-09 06:00:27 +02:00
}
]
}