Sap Vulnerabilities

Comprehensive security vulnerability database for Sap products

Last updated: Oct 11, 2022
Total CVEs

13

Critical

3

With Exploits

9

Last 30 Days

0

Severity Distribution

Critical3
23%
High13
100%
Medium2
15%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2022-411677.8

This vulnerability allows an attacker to run malicious code on a victim's computer when they open a specially crafted AutoCAD file in SAP 3D Visual Enterprise Author. The attacker needs the victim to open this manipulated file, which can come from untrusted sources, to exploit the flaw.

sap3d visual enterprise author
Theoretical
over 3 years agoOct 11, 2022
CVE-2022-398087.8

This vulnerability allows an attacker to execute malicious code on a victim's system by tricking them into opening a specially crafted 3D object file in SAP 3D Visual Enterprise Author. It requires the victim to open a file from an untrusted source, which can lead to serious security breaches.

sap3d visual enterprise author
Theoretical
over 3 years agoOct 11, 2022
CVE-2022-398067.8

This vulnerability allows an attacker to run malicious code on a victim's computer if they open a specially crafted SolidWorks Drawing file in SAP 3D Visual Enterprise Author version 9. The attacker needs the victim to open this manipulated file, which could come from untrusted sources, to exploit the flaw.

sap3d visual enterprise author
Theoretical
over 3 years agoOct 11, 2022
CVE-2022-398057.8

This vulnerability allows an attacker to run malicious code on a victim's computer by tricking them into opening a specially crafted graphics file in SAP 3D Visual Enterprise Author. It requires the victim to open a file from an untrusted source, which can lead to serious security breaches.

sap3d visual enterprise author
Theoretical
over 3 years agoOct 11, 2022
CVE-2022-398047.8

An attacker can execute malicious code on a victim's system by tricking them into opening a specially crafted SolidWorks Part file in SAP 3D Visual Enterprise Author. This vulnerability requires the victim to open a file from an untrusted source, which can lead to serious security breaches.

sap3d visual enterprise author
Exploit Available
over 3 years agoOct 11, 2022
CVE-2022-398037.8

This vulnerability allows an attacker to run malicious code on a victim's computer if they open a specially crafted 3D file from an untrusted source in SAP 3D Visual Enterprise Author. It requires the victim to open the manipulated file, which can exploit memory management flaws in the software.

sap3d visual enterprise author
Theoretical
over 3 years agoOct 11, 2022
CVE-2022-352907.5

This vulnerability allows an attacker to access restricted information in the SAP Authenticator app for Android. It occurs under specific conditions, meaning that certain circumstances must be met for the attack to succeed.

sapauthenticator
Theoretical
over 3 years agoAug 10, 2022
CVE-2022-287717.5

This vulnerability allows an attacker to send harmful requests to the SAP Business One License service without needing to log in, potentially crashing the entire application and making it unavailable to users. The attacker only needs network access to exploit this flaw, which means they don't need any special permissions or credentials.

sapbusiness one license service api
Exploit Available
over 3 years agoJul 12, 2022
CVE-2022-315958.8

This vulnerability allows an attacker with an authenticated account to gain higher privileges than intended, potentially letting them access sensitive data or perform unauthorized actions within the SAP Financial Consolidation system. It occurs because the software fails to properly check if the user has permission for certain actions, meaning that simply being logged in is enough for exploitation.

sapadaptive server enterprise
Theoretical
almost 4 years agoJun 14, 2022
CVE-2022-287737.5

This vulnerability allows an attacker to cause the SAP Web Dispatcher and Internet Communication Manager to crash, resulting in a denial of service that temporarily disrupts access to the application. The attacker needs to send specially crafted requests that trigger uncontrolled recursion, but the system can automatically restart afterward.

sapnetweaver
Theoretical
almost 4 years agoApr 12, 2022
CVE-2022-225318.1

An attacker with basic user rights can upload or download files in the SAP S/4HANA application, allowing them to run malicious scripts that could expose or alter sensitive information. This vulnerability arises because the application fails to properly check the files being handled.

saps\/4hana
Exploit Available
about 4 years agoJan 14, 2022
CVE-2022-225308.1

This vulnerability allows an attacker with basic user rights to upload harmful files or code into the SAP S/4HANA application, potentially leading to unauthorized changes to critical information or making the application unavailable. The issue arises because the application does not properly check the files being uploaded or downloaded, making it easy for attackers to exploit.

saps\/4hana
Exploit Available
about 4 years agoJan 14, 2022
CVE-2021-381638.8

This vulnerability allows an attacker, who is already logged in as a regular user, to upload a harmful file that can execute commands on the server with high-level privileges. This means they could access, change, or delete sensitive information, or even take the server offline, making it unusable.

sapnetweaver
Exploit Available
over 4 years agoSep 14, 2021

About Sap Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Sap products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.