In SAP Host Agent (Windows) - versions 7.21, 7.22, an attacker who gains local membership to SAP_LocalAdmin could be able to replace executables with a malicious file that will be started under a privileged account. Note that by default all user members of SAP_LocaAdmin are denied the ability to logon locally by security policy so that this can only occur if the system has already been compromised.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-12117 In SAP Host Agent (Windows) - versions 7.21, 7.22, an attacker who gains local membership to SAP_LocalAdmin could be able to replace executables with a malicious file that will be started under a privileged account. Note that by default all user members of SAP_LocaAdmin are denied the ability to logon locally by security policy so that this can only occur if the system has already been compromised.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 09 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2025-04-09T14:06:07.736Z

Reserved: 2022-12-16T03:12:52.291Z

Link: CVE-2023-0012

cve-icon Vulnrichment

Updated: 2024-08-02T04:54:32.561Z

cve-icon NVD

Status : Modified

Published: 2023-01-10T03:15:10.067

Modified: 2024-11-21T07:36:23.477

Link: CVE-2023-0012

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.