SAPCAR allows an attacker logged in with high privileges to create a malicious SAR archive in SAPCAR. This could enable the attacker to exploit critical files and directory permissions without breaking signature validation, resulting in potential privilege escalation. This has high impact on integrity, but low impact on confidentiality and availability of the system.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 08 Jul 2025 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SAPCAR allows an attacker logged in with high privileges to create a malicious SAR archive in SAPCAR. This could enable the attacker to exploit critical files and directory permissions without breaking signature validation, resulting in potential privilege escalation. This has high impact on integrity, but low impact on confidentiality and availability of the system. | |
Title | Multiple Privilege Escalation Vulnerabilities in SAPCAR | |
Weaknesses | CWE-266 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: sap
Published: 2025-07-08T00:38:42.352Z
Updated: 2025-07-11T03:55:27.257Z
Reserved: 2025-04-16T13:25:50.941Z
Link: CVE-2025-42992

Updated: 2025-07-08T18:11:26.435Z

Status : Awaiting Analysis
Published: 2025-07-08T01:15:25.887
Modified: 2025-07-08T16:18:14.207
Link: CVE-2025-42992

No data.