Multiple vulnerabilities have been reported, which could be exploited by an attacker to disclose sensitive information, gain elevated privileges, bypass security restrictions, perform Cross-Site Scripting (XSS) and CSRF attacks, execute arbitrary code, manipulate user sessions, access unauthorized files, and cause denial-of-service condition on the targeted system.
Target Audience:
SAP system administrators, SAP security teams, IT infrastructure teams managing SAP landscape and Application developers using affected SAP.
Risk Assessment:
Potential for system compromise, data exposure, unauthorized access, privilege abuse, service disruption, application manipulation.
Impact Assessment:
High risk of data breach, full system compromise, prolonged service unavailability, security control bypass, and remote code execution.
The information provided herein is on "as is" basis, without warranty of any kind.