
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-50422 affects the SAP BTP Security Services Integration Library (cloud-security-services-integration-library) in versions below 2.17.0 and versions from 3.0.0 to before 3.3.0. The vulnerability was disclosed on December 11, 2023, and impacts Java-based applications using this library for authentication and authorization services (NVD, GitHub Advisory).
The vulnerability has been assigned a Critical severity rating with a CVSS v3.1 base score of 9.1 (CRITICAL). The vulnerability vector string is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, indicating that it can be exploited over the network, requires low attack complexity, needs no privileges or user interaction, and can result in high impact to confidentiality and integrity (GitHub Advisory).
The vulnerability allows an unauthenticated attacker to obtain arbitrary permissions within the application under certain conditions. This privilege escalation issue can lead to unauthorized access to sensitive functionality and data within affected applications (GitHub Advisory).
Users are strongly advised to upgrade to patched versions: either version 2.17.0 or higher, or version 3.3.0 or higher. No workarounds are available for this vulnerability, making the upgrade to a patched version the only solution (GitHub Advisory).
SAP has addressed this vulnerability as part of their December 2023 security updates, highlighting its critical nature and the importance of immediate patching (SAP Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."