Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-6364 : Exploit Details and Defense Strategies

Learn about CVE-2020-6364 affecting SAP Solution Manager and SAP Focused Run. Discover the impact, affected versions, and mitigation steps for this critical Code Injection vulnerability.

SAP Solution Manager and SAP Focused Run are affected by a critical vulnerability that allows attackers to execute OS commands and potentially gain control over the host. This can lead to Code Injection, compromising system files and availability.

Understanding CVE-2020-6364

This CVE involves a security flaw in SAP Solution Manager and SAP Focused Run, enabling attackers to manipulate cookies to execute malicious commands.

What is CVE-2020-6364?

The vulnerability in SAP Solution Manager and SAP Focused Run allows attackers to modify cookies to execute OS commands, potentially leading to host takeover and Code Injection.

The Impact of CVE-2020-6364

The exploit can result in attackers gaining control over the CA Introscope Enterprise Manager host, allowing them to read and modify system files, impacting system availability severely.

Technical Details of CVE-2020-6364

This section provides detailed technical information about the vulnerability.

Vulnerability Description

The vulnerability enables attackers to modify cookies to execute OS commands, leading to potential host takeover and Code Injection.

Affected Systems and Versions

        Affected products: SAP Solution Manager and SAP Focused Run
        Vulnerable versions: < WILY_INTRO_ENTERPRISE 9.7, < 10.1, < 10.5, < 10.7

Exploitation Mechanism

        Attack Complexity: Low
        Attack Vector: Network
        Privileges Required: None
        Scope: Changed
        User Interaction: None
        CVSS Score: 10.0 (Critical)
        Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Mitigation and Prevention

Protect your systems from CVE-2020-6364 with the following steps:

Immediate Steps to Take

        Apply the provided updates for WILY_INTRO_ENTERPRISE versions mentioned.
        Monitor system logs for any suspicious activities.

Long-Term Security Practices

        Regularly update and patch all software components.
        Implement network segmentation to limit the attack surface.

Patching and Updates

        Ensure all systems are updated with the latest security patches.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now