Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Insecure default configuration of ACLs in KM, SAP security note 1499993


#After installation, all KM repositories and their subfolders have the default permission #Everyone: Full Control#. Since all users belong to the Everyone-user-group by default, it may allow newly registered users to access and compromise the repositories and documents.

CVSS Information

CVSS Base Score: 6.5
CVSS Base Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

SAP is providing this CVSS base score as an estimate of the risk posed by the issue reported in this note. This estimate does not take into consideration your own system configuration, or operational environment. It is not intended to replace any risk assessments you are advised to conduct when deciding the applicability or priority of this SAP security note. Please see the FAQ section on for more information.

Available fix and Supported packages

  • LM-PORTAL | 7.30 | 7.30
  • KMC-BC | 7.00 | 7.02
  • KMC-CM | 7.00 | 7.02
  • KMC-COLL | 7.00 | 7.02
  • LMCFG | 7.30 | 7.30
  • EP-CM | 6.0_640 | 6.0_640
  • LIFECYCLE MGMT PORTAL 7.30 | SP001 | 000001
  • LIFECYCLE MGMT PORTAL 7.30 | SP002 | 000000

Affected component

    System Administration


Score: 0


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.




More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below