Successfactors Mobile SAP Successfactors Mobile

Do you want an email whenever new security vulnerabilities are reported in SAP Successfactors Mobile?

By the Year

In 2024 there have been 0 vulnerabilities in SAP Successfactors Mobile . Successfactors Mobile did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 1 8.10
2021 1 5.50
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Successfactors Mobile vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent SAP Successfactors Mobile Security Vulnerabilities

Due to misconfigured application endpoints, SAP SuccessFactors attachment APIs

CVE-2022-35291 8.1 - High - July 27, 2022

Due to misconfigured application endpoints, SAP SuccessFactors attachment APIs allow attackers with user privileges to perform activities with admin privileges over the network. These APIs were consumed in the SF Mobile application for Time Off, Time Sheet, EC Workflow, and Benefits. On successful exploitation, the attacker can read/write attachments. Thus, compromising the confidentiality and integrity of the application

Improper Privilege Management

A vulnerability has been identified in SAP SuccessFactors Mobile Application for Android - versions older than 2108, which

CVE-2021-40498 5.5 - Medium - October 12, 2021

A vulnerability has been identified in SAP SuccessFactors Mobile Application for Android - versions older than 2108, which allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service, which can lead to denial of service. The vulnerability is related to Android implementation methods that are widely used across Android mobile applications, and such methods are embedded into the SAP SuccessFactors mobile application. These Android methods begin executing once the user accesses their profile on the mobile application. While executing, it can also pick up the activities from other Android applications that are running in the background of the users device and are using the same types of methods in the application. Such vulnerability can also lead to phishing attacks that can be used for staging other types of attacks.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for SAP Successfactors Mobile or by SAP? Click the Watch button to subscribe.

SAP
Vendor

subscribe