An authenticated attacker with high privilege can use functions of SLCM transactions to which access should be restricted. This may result in an escalation of privileges causing low impact on integrity of the application.
https://url.sap/sapsecuritypatchday
https://me.sap.com/notes/2256627
Source: Mitre, NVD
Published: 2024-09-10
Updated: 2024-09-10
Base Score: 3.3
Vector: CVSS2#AV:N/AC:L/Au:M/C:N/I:P/A:N
Severity: Low
Base Score: 2.4
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N