SAPCAR allows an attacker logged in with high privileges to create a malicious SAR archive in SAPCAR. This could enable the attacker to exploit critical files and directory permissions without breaking signature validation, resulting in potential privilege escalation. This has high impact on integrity, but low impact on confidentiality and availability of the system.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Jul 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAPCAR allows an attacker logged in with high privileges to create a malicious SAR archive in SAPCAR. This could enable the attacker to exploit critical files and directory permissions without breaking signature validation, resulting in potential privilege escalation. This has high impact on integrity, but low impact on confidentiality and availability of the system. | |
| Title | Multiple Privilege Escalation Vulnerabilities in SAPCAR | |
| Weaknesses | CWE-266 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published: 2025-07-08T00:38:42.352Z
Updated: 2025-07-11T03:55:27.257Z
Reserved: 2025-04-16T13:25:50.941Z
Link: CVE-2025-42992
Updated: 2025-07-08T18:11:26.435Z
Status : Awaiting Analysis
Published: 2025-07-08T01:15:25.887
Modified: 2025-07-08T16:18:14.207
Link: CVE-2025-42992
No data.