CVE-2020-6317
LOW
2,6
Source: [email protected]
Attack Vector: adjacent_network
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
LOW
2,7
Source: [email protected]
Access Vector: adjacent_network
Access Complexity: low
Authentication: single
Confidentiality: partial
Integrity: none
Availability: none
Description
AI Translation Available
In certain situations, an attacker with regular user credentials and local access to an ASE cockpit installation can access sensitive information which appears in the installation log files. This information although sensitive is of limited utility and cannot be used to further access, modify or render unavailable any other information in the cockpit or system. This affects SAP Adaptive Server Enterprise, Versions - 15.7, 16.0.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0007
Percentile
0,2th
Updated
EPSS Score Trend (Last 90 Days)
532
Insertion of Sensitive Information into Log File
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
All platforms may be affected
Application
Adaptive Server Enterprise by Sap
CPE Identifier
View Detailed Analysis
cpe:2.3:a:sap:adaptive_server_enterprise:16.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Adaptive Server Enterprise by Sap
CPE Identifier
View Detailed Analysis
cpe:2.3:a:sap:adaptive_server_enterprise:15.7:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://launchpad.support.sap.com/#/notes/2953203
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700
https://launchpad.support.sap.com/#/notes/2953203
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700