CVE-2021-38150
14.09.2021, 12:15
When an attacker manages to get access to the local memory, or the memory dump of a victim, for example by a social engineering attack, SAP Business Client versions - 7.0, 7.70, will allow him to read extremely sensitive data, such as credentials. This would allow the attacker to compromise the corresponding backend for which the credentials are valid.Enginsight
Vendor | Product | Version |
---|---|---|
sap | business_client | 6.0 |
sap | business_client | 6.0:patch_level1 |
sap | business_client | 6.0:patch_level10 |
sap | business_client | 6.0:patch_level11 |
sap | business_client | 6.0:patch_level12 |
sap | business_client | 6.0:patch_level13 |
sap | business_client | 6.0:patch_level14 |
sap | business_client | 6.0:patch_level15 |
sap | business_client | 6.0:patch_level16 |
sap | business_client | 6.0:patch_level17 |
sap | business_client | 6.0:patch_level2 |
sap | business_client | 6.0:patch_level3 |
sap | business_client | 6.0:patch_level4 |
sap | business_client | 6.0:patch_level5 |
sap | business_client | 6.0:patch_level6 |
sap | business_client | 6.0:patch_level7 |
sap | business_client | 6.0:patch_level8 |
sap | business_client | 6.0:patch_level9 |
sap | business_client | 6.5 |
sap | business_client | 6.5:patch_level1 |
sap | business_client | 6.5:patch_level10 |
sap | business_client | 6.5:patch_level11 |
sap | business_client | 6.5:patch_level12 |
sap | business_client | 6.5:patch_level13 |
sap | business_client | 6.5:patch_level14 |
sap | business_client | 6.5:patch_level15 |
sap | business_client | 6.5:patch_level16 |
sap | business_client | 6.5:patch_level17 |
sap | business_client | 6.5:patch_level18 |
sap | business_client | 6.5:patch_level19 |
sap | business_client | 6.5:patch_level2 |
sap | business_client | 6.5:patch_level20 |
sap | business_client | 6.5:patch_level21 |
sap | business_client | 6.5:patch_level22 |
sap | business_client | 6.5:patch_level3 |
sap | business_client | 6.5:patch_level4 |
sap | business_client | 6.5:patch_level5 |
sap | business_client | 6.5:patch_level6 |
sap | business_client | 6.5:patch_level7 |
sap | business_client | 6.5:patch_level8 |
sap | business_client | 6.5:patch_level9 |
sap | business_client | 7.0 |
sap | business_client | 7.0:patch_level1 |
sap | business_client | 7.0:patch_level10 |
sap | business_client | 7.0:patch_level11 |
sap | business_client | 7.0:patch_level12 |
sap | business_client | 7.0:patch_level13 |
sap | business_client | 7.0:patch_level14 |
sap | business_client | 7.0:patch_level15 |
sap | business_client | 7.0:patch_level16 |
sap | business_client | 7.0:patch_level17 |
sap | business_client | 7.0:patch_level18 |
sap | business_client | 7.0:patch_level19 |
sap | business_client | 7.0:patch_level2 |
sap | business_client | 7.0:patch_level20 |
sap | business_client | 7.0:patch_level3 |
sap | business_client | 7.0:patch_level4 |
sap | business_client | 7.0:patch_level5 |
sap | business_client | 7.0:patch_level6 |
sap | business_client | 7.0:patch_level7 |
sap | business_client | 7.0:patch_level8 |
sap | business_client | 7.0:patch_level9 |
sap | business_client | 7.70 |
sap | business_client | 7.70:patch_level1 |
sap | business_client | 7.70:patch_level2 |
sap | business_client | 7.70:patch_level3 |
sap | business_client | 7.70:patch_level4 |
sap | business_client | 7.70:patch_level5 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration