SAP BusinessObjects Business Intelligence Platform allows an unauthenticated attacker to perform session hijacking over the network without any user interaction, due to an information disclosure vulnerability. Attacker can access and modify all the data of the application.
History

Fri, 24 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sap:businessobjects_business_intelligence_platform:2025:*:*:*:-:*:*:*
cpe:2.3:a:sap:businessobjects_business_intelligence_platform:420:*:*:*:enterprise:*:*:*
cpe:2.3:a:sap:businessobjects_business_intelligence_platform:430:*:*:*:-:*:*:*

Tue, 14 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Jan 2025 00:45:00 +0000

Type Values Removed Values Added
Description SAP BusinessObjects Business Intelligence Platform allows an unauthenticated attacker to perform session hijacking over the network without any user interaction, due to an information disclosure vulnerability. Attacker can access and modify all the data of the application.
Title Multiple vulnerabilities in SAP BusinessObjects Business Intelligence Platform
Weaknesses CWE-497
References
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published: 2025-01-14T00:09:21.343Z

Updated: 2025-01-14T14:58:33.186Z

Reserved: 2024-12-05T21:53:04.934Z

Link: CVE-2025-0061

cve-icon Vulnrichment

Updated: 2025-01-14T14:58:25.708Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-14T01:15:16.500

Modified: 2025-10-24T19:14:21.880

Link: CVE-2025-0061

cve-icon Redhat

No data.