CVE-2021-38150
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
When an attacker manages to get access to the local memory, or the memory dump of a victim, for example by a social engineering attack, SAP Business Client versions - 7.0, 7.70, will allow him to read extremely sensitive data, such as credentials. This would allow the attacker to compromise the corresponding backend for which the credentials are valid.
Cuando un atacante consigue acceder a la memoria local, o al volcado de memoria de una víctima, por ejemplo mediante un ataque de ingeniería social, SAP Business Client versiones - 7.0, 7.70, le permitirán leer datos extremadamente confidenciales, como las credenciales. Esto permitiría al atacante comprometer el backend correspondiente para el que las credenciales son válidas
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-08-06 CVE Reserved
- 2021-09-14 CVE Published
- 2024-05-30 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-312: Cleartext Storage of Sensitive Information
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | 2022-07-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sap Search vendor "Sap" | Business Client Search vendor "Sap" for product "Business Client" | 7.0 Search vendor "Sap" for product "Business Client" and version "7.0" | - |
Affected
| ||||||
Sap Search vendor "Sap" | Business Client Search vendor "Sap" for product "Business Client" | 7.70 Search vendor "Sap" for product "Business Client" and version "7.70" | - |
Affected
|