When an attacker manages to get access to the local memory, or the memory dump of a victim, for example by a social engineering attack, SAP Business Client versions - 7.0, 7.70, will allow him to read extremely sensitive data, such as credentials. This would allow the attacker to compromise the corresponding backend for which the credentials are valid.
2021-09-14T12:15:10.503
2025-05-27T16:49:57.223
Analyzed
CVSSv3.1: 6.5 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:N/A:N
8.6
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.0 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 6.5 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.0 | Yes |
| Application | sap | business_client | 7.70 | Yes |
| Application | sap | business_client | 7.70 | Yes |
| Application | sap | business_client | 7.70 | Yes |
| Application | sap | business_client | 7.70 | Yes |
| Application | sap | business_client | 7.70 | Yes |
| Application | sap | business_client | 7.70 | Yes |