Description
A Windows user with basic user authorization can exploit a DLL hijacking attack in SapSetup (Software Installation Program) - version 9.0, resulting in a privilege escalation running code as administrator of the very same Windows PC. A successful attack depends on various preconditions beyond the attackers control.

Published: 2023-04-11
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-32788 A Windows user with basic user authorization can exploit a DLL hijacking attack in SapSetup (Software Installation Program) - version 9.0, resulting in a privilege escalation running code as administrator of the very same Windows PC. A successful attack depends on various preconditions beyond the attackers control.
History

Wed, 12 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2025-02-26T19:07:54.186Z

Reserved: 2023-04-03T09:22:43.158Z

Link: CVE-2023-29187

cve-icon Vulnrichment

Updated: 2024-08-02T14:00:15.993Z

cve-icon NVD

Status : Modified

Published: 2023-04-11T04:16:08.747

Modified: 2024-11-21T07:56:40.843

Link: CVE-2023-29187

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses