SAP BusinessObjects Business Intelligence Platform allows a high privilege user to run client desktop applications even if some of the DLLs are not digitally signed or if the signature is broken. The attacker needs to have local access to the vulnerable system to perform DLL related tasks. This could result in a high impact on confidentiality and integrity of the application.
History

Tue, 17 Sep 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap business Objects Business Intelligence Platform
CPEs cpe:2.3:a:sap:business_objects_business_intelligence_platform:430:*:*:*:*:*:*:*
Vendors & Products Sap
Sap business Objects Business Intelligence Platform
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Sep 2024 04:45:00 +0000

Type Values Removed Values Added
Description SAP BusinessObjects Business Intelligence Platform allows a high privilege user to run client desktop applications even if some of the DLLs are not digitally signed or if the signature is broken. The attacker needs to have local access to the vulnerable system to perform DLL related tasks. This could result in a high impact on confidentiality and integrity of the application.
Title DLL hijacking vulnerability in SAP BusinessObjects Business Intelligence Platform
Weaknesses CWE-426
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published: 2024-09-10T04:32:43.378Z

Updated: 2024-09-16T16:17:11.239Z

Reserved: 2024-08-26T10:39:20.932Z

Link: CVE-2024-45281

cve-icon Vulnrichment

Updated: 2024-09-10T13:19:25.520Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-10T05:15:12.007

Modified: 2024-09-10T12:09:50.377

Link: CVE-2024-45281

cve-icon Redhat

No data.