Skip links
🔥🔥🔥 Join us for our upcoming training session at Black Hat MEA: "Securing SAP Systems: Expert Insights and Penetration Testing Techniques" 🛡️🔍

Missing authorization check in ICM, SAP security note 1612700

Description

An authenticated user can use functions of ICM to which access should be re-stricted. This may result in an escalation of privileges.

Available fix and Supported packages

  • EA-APPL | 110 | 110
  • EA-APPL | 200 | 200
  • EA-APPL | 500 | 500
  • EA-APPL | 600 | 600
  • EA-APPL | 602 | 602
  • EA-APPL | 603 | 603
  • EA-APPL | 604 | 604
  • EA-APPL | 605 | 605
  • EA-APPL | 606 | 606
  • EA-APPL 602 | SAPK-60210INEAAPPL |
  • EA-APPL 603 | SAPK-60309INEAAPPL |
  • EA-APPL 604 | SAPK-60410INEAAPPL |
  • EA-APPL 110 | SAPKGPAA33 |
  • EA-APPL 200 | SAPKGPAB22 |
  • EA-APPL 500 | SAPKGPAC26 |
  • EA-APPL 605 | SAPK-60506INEAAPPL |
  • EA-APPL 606 | SAPK-60601INEAAPPL |
  • EA-APPL 600 | SAPKGPAD21 |

Affected component

    ICM-TO
    Technical Integration, Tools

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1612700

TAGS

#Authorization
#authorization-check
#ICM

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer