| ID |
CVE-2026-24317
|
| Sažetak |
SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability. |
| Reference |
|
| CVSS |
| Base: | 5.0 |
| Impact: | 3.4 |
| Exploitability: | 1.6 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
HIGH |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| LOW |
LOW |
LOW |
|
| CVSS vektor |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L |
| Zadnje važnije ažuriranje |
11-03-2026 - 13:53 |
| Objavljeno |
10-03-2026 - 17:35 |