Identity Management SAP Identity Management

Do you want an email whenever new security vulnerabilities are reported in SAP Identity Management?

By the Year

In 2024 there have been 0 vulnerabilities in SAP Identity Management . Identity Management did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 1 6.50
2019 1 8.80
2018 2 5.35

It may take a day or so for new Identity Management vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent SAP Identity Management Security Vulnerabilities

SAP Identity Management, version 8.0, does not perform necessary authorization checks for an authenticated user

CVE-2020-6258 6.5 - Medium - May 12, 2020

SAP Identity Management, version 8.0, does not perform necessary authorization checks for an authenticated user, allowing the attacker to view certain sensitive information of the victim, leading to Missing Authorization Check.

AuthZ

Under certain conditions, it is possible to request the modification of role or privilege assignments through SAP Identity Management REST Interface Version 2

CVE-2019-0301 8.8 - High - May 14, 2019

Under certain conditions, it is possible to request the modification of role or privilege assignments through SAP Identity Management REST Interface Version 2, which would otherwise be restricted only for viewing.

Improper Privilege Management

SAP Identity Management 7.2 and 8.0 do not sufficiently validate an XML document accepted

CVE-2018-2416 5.4 - Medium - May 09, 2018

SAP Identity Management 7.2 and 8.0 do not sufficiently validate an XML document accepted from an untrusted source.

Improper Input Validation

Under certain conditions, the SAP Identity Management 8.0 (pass of type ToASCII)

CVE-2018-2417 5.3 - Medium - May 09, 2018

Under certain conditions, the SAP Identity Management 8.0 (pass of type ToASCII) allows an attacker to access information which would otherwise be restricted.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for SAP Identity Management or by SAP? Click the Watch button to subscribe.

SAP
Vendor

subscribe