CVE-2022-22528

SAP Adaptive Server Enterprise (ASE) - version 16.0, installation makes an entry in the system PATH environment variable in Windows platform which, under certain conditions, allows a Standard User to execute malicious Windows binaries which may lead to privilege escalation on the local system. The issue is with the ASE installer and does not impact other ASE binaries.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:sap:adaptive_server_enterprise:16.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

14 Aug 2023, 13:15

Type Values Removed Values Added
Summary SAP Adaptive Server Enterprise (ASE) - version 16.0, installation makes an entry in the system PATH environment variable in Windows platform which, under certain conditions, allows a Standard User to execute malicious Windows binaries which may lead to privilege escalation on the local system. The issue is with the ASE installer and does not impact other ASE binaries. SAP Adaptive Server Enterprise (ASE) - version 16.0, installation makes an entry in the system PATH environment variable in Windows platform which, under certain conditions, allows a Standard User to execute malicious Windows binaries which may lead to privilege escalation on the local system. The issue is with the ASE installer and does not impact other ASE binaries.

24 Jul 2023, 13:50

Type Values Removed Values Added
CWE CWE-200 CWE-427

27 Oct 2022, 01:09

Type Values Removed Values Added
References (MISC) https://launchpad.support.sap.com/#/notes/3140564 - Permissions Required (MISC) https://launchpad.support.sap.com/#/notes/3140564 - Permissions Required, Vendor Advisory
References (MISC) https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - (MISC) https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory

24 Aug 2022, 16:15

Type Values Removed Values Added
References
  • {'url': 'https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+February+2022', 'name': 'https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+February+2022', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • (MISC) https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -
CWE NVD-CWE-noinfo CWE-200

16 Feb 2022, 21:14

Type Values Removed Values Added
First Time Sap
Microsoft windows
Microsoft
Sap adaptive Server Enterprise
CVSS v2 : unknown
v3 : unknown
v2 : 4.4
v3 : 7.8
References (MISC) https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+February+2022 - (MISC) https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+February+2022 - Vendor Advisory
References (MISC) https://launchpad.support.sap.com/#/notes/3140564 - (MISC) https://launchpad.support.sap.com/#/notes/3140564 - Permissions Required
CWE CWE-200 NVD-CWE-noinfo
CPE cpe:2.3:a:sap:adaptive_server_enterprise:16.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

09 Feb 2022, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-09 23:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-22528

Mitre link : CVE-2022-22528

CVE.ORG link : CVE-2022-22528


JSON object : View

Products Affected

microsoft

  • windows

sap

  • adaptive_server_enterprise
CWE
CWE-427

Uncontrolled Search Path Element