Discover the impact of CVE-2022-35291, a high-severity privilege escalation vulnerability in SAP SuccessFactors attachment APIs for Android & iOS. Learn about affected systems and mitigation steps.
A privilege escalation vulnerability has been identified in the SAP SuccessFactors attachment API for the Mobile Application for Android & iOS devices, potentially allowing attackers to elevate their privileges and compromise system integrity and confidentiality.
Understanding CVE-2022-35291
This CVE involves a misconfiguration in the SAP SuccessFactors attachment APIs that can be exploited by attackers with user privileges to gain admin privileges over the network, specifically affecting the SF Mobile application.
What is CVE-2022-35291?
The vulnerability in the SAP SuccessFactors attachment API enables attackers to manipulate application endpoints, leading to unauthorized activities with elevated privileges, compromising data confidentiality and integrity.
The Impact of CVE-2022-35291
This vulnerability poses a high severity risk with a CVSS base score of 8.1, allowing attackers to read/write attachments and potentially exploit the affected systems with low privileges required.
Technical Details of CVE-2022-35291
The following technical details shed light on the specifics of the vulnerability:
Vulnerability Description
The misconfigured application endpoints in the SAP SuccessFactors attachment APIs allow attackers to perform admin activities over the network, affecting the Time Off, Time Sheet, EC Workflow, and Benefits modules of the SF Mobile application.
Affected Systems and Versions
The vulnerability impacts SAP SuccessFactors Mobile Application for Android & iOS devices with versions less than V8.0.5.
Exploitation Mechanism
Attackers with user privileges exploit the misconfigured attachment APIs to gain admin-level access, compromising system confidentiality and integrity.
Mitigation and Prevention
To address the CVE-2022-35291 vulnerability, the following steps are recommended:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates