SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Jul 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system. | |
| Title | Multiple Privilege Escalation Vulnerabilities in SAPCAR | |
| Weaknesses | CWE-266 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published: 2025-07-08T00:38:50.441Z
Updated: 2025-07-11T03:55:26.483Z
Reserved: 2025-04-16T13:25:50.942Z
Link: CVE-2025-43001
Updated: 2025-07-08T18:11:23.772Z
Status : Awaiting Analysis
Published: 2025-07-08T01:15:26.047
Modified: 2025-07-08T16:18:14.207
Link: CVE-2025-43001
No data.