Unauthenticated Token Retrieval Vulnerability in SAP BusinessObjects CMC
CVE-2022-35228

8.8HIGH

Key Information:

Summary

SAP BusinessObjects CMC has a vulnerability that allows unauthenticated attackers to retrieve sensitive token information over the network. This exploitation occurs when a legitimate user is interacting with the application, creating an opportunity for local compromise through methods such as network sniffing or social engineering attacks. If successfully exploited, the attacker gains the ability to completely compromise the SAP BusinessObjects CMC application, posing a significant risk to the security of the system.

Affected Version(s)

SAP BusinessObjects Business Intelligence Platform (Central management Console) 420

SAP BusinessObjects Business Intelligence Platform (Central management Console) 430

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.