Critical CVE-2020-26820 allows attackers to compromise SAP NetWeaver AS JAVA integrity through OS command execution. Learn about impact, mitigation, and prevention.
SAP NetWeaver AS JAVA versions 7.20, 7.30, 7.31, 7.40, 7.50 allow an attacker to execute OS commands through the administrator console, leading to Privilege Escalation.
Understanding CVE-2020-26820
SAP NetWeaver AS JAVA vulnerability with a critical base score of 9.1.
What is CVE-2020-26820?
Attackers can exploit an authenticated administrator's access to expose unauthenticated file system access and upload malicious files, leading to OS command execution.
This vulnerability can compromise server OS integrity, confidentiality, and availability.
The Impact of CVE-2020-26820
CVSS Score: 9.1 (Critical)
Attack Vector: Network
Attack Complexity: Low
Privileges Required: High
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: High
Scope: Changed
User Interaction: None
Technical Details of CVE-2020-26820
SAP NetWeaver AS JAVA vulnerability details.
Vulnerability Description
Allows an attacker with admin access to compromise system integrity through OS command execution.