Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on May 15th, 2019 📆 | 1658 Views ⚑

0

SAP Identity Management REST Interface Request privilege escalation


Text to Speech

CVSS Meta Temp Score Current Exploit Price (≈)
5.5 $5k-$25k

A vulnerability was found in SAP Identity Management (version unknown). It has been classified as critical. Affected is code of the component REST Interface. The manipulation as part of a Request leads to a privilege escalation vulnerability. CWE is classifying the issue as CWE-269. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was shared 05/14/2019. This vulnerability is traded as CVE-2019-0301 since 11/26/2018. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $5k-$25k (estimation calculated on 05/15/2019).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Vendor

Name

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.5
VulDB Vector: ?
VulDB Reliability: ?

VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Privilege escalation (CWE-269)
Local: Yes
Remote: No





Availability: ?
Status: Not defined

Price Prediction: ?
Current Price Estimation: ?


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: no mitigation known
0-Day Time: ?11/26/2018 CVE assigned
05/14/2019 +169 days Advisory disclosed
05/15/2019 +1 days VulDB entry created
05/15/2019 +0 days VulDB last updateCVE: CVE-2019-0301 (?)
scip Labs: https://www.scip.ch/en/?labs.20150716Created: 05/15/2019 10:17 AM
Complete: ?

Comments

No comments yet. Please log in to comment.

Check our Alexa App!

https://vuldb.com/?id.135024

Tagged with:



Comments are closed.