SAP Business Client, versions 6.5, 7.0, does not perform necessary integrity checks which could be exploited by an attacker under certain conditions to modify the installer.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-27378 | SAP Business Client, versions 6.5, 7.0, does not perform necessary integrity checks which could be exploited by an attacker under certain conditions to modify the installer. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 27 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sap:business_client:7.0:*:*:*:*:*:*:* |
cpe:2.3:a:sap:business_client:6.0:-:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level10:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level11:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level12:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level13:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level14:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level15:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level16:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level17:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level1:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level2:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level3:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level4:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level5:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level6:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level7:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level8:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level9:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:-:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level10:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level11:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level12:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level13:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level14:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level15:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level16:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level17:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level18:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level19:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level1:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level2:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level3:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level4:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level5:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level6:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level7:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level8:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level9:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:-:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level1:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level2:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level3:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level4:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level5:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level6:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-08-04T08:55:22.286Z
Reserved: 2020-01-08T00:00:00.000Z
Link: CVE-2020-6228
No data.
Status : Analyzed
Published: 2020-04-14T19:15:17.750
Modified: 2025-05-27T16:51:05.210
Link: CVE-2020-6228
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD