Impact
The SAP Identity Management REST interface contains insufficient input handling that allows an authenticated administrator to send specially crafted malicious REST requests. These requests are processed by JNDI operations without adequate input neutralization, potentially enabling the attacker to disclose or modify data, leading to low impact on confidentiality and integrity and no impact on availability.
Affected Systems
SAP, product SAP Identity Management, with no specific version information available in the CNA data.
Risk and Exploitability
The vulnerability scores a CVSS of 3.8, indicating low severity, and an EPSS score of less than 1%, reflecting a very low probability of exploitation. It is not listed in the CISA KEV catalog. Exploitation requires the attacker to be an authenticated administrator, a high‐privilege role, which limits its reach. The overall risk remains low but should be monitored.
OpenCVE Enrichment