SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system.
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 9e-05}

epss

{'score': 0.0001}


Tue, 08 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 08 Jul 2025 01:15:00 +0000

Type Values Removed Values Added
Description SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system.
Title Multiple Privilege Escalation Vulnerabilities in SAPCAR
Weaknesses CWE-266
References
Metrics cvssV3_1

{'score': 6.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published: 2025-07-08T00:38:50.441Z

Updated: 2025-07-11T03:55:26.483Z

Reserved: 2025-04-16T13:25:50.942Z

Link: CVE-2025-43001

cve-icon Vulnrichment

Updated: 2025-07-08T18:11:23.772Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-08T01:15:26.047

Modified: 2025-07-08T16:18:14.207

Link: CVE-2025-43001

cve-icon Redhat

No data.