{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T20:46:11.965893Z","vulnerabilities":[{"cve":{"id":"CVE-2022-41203","sourceIdentifier":"cna@sap.com","published":"2022-11-08T22:15:17.077","lastModified":"2024-11-21T07:22:49.143","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In some workflow of SAP BusinessObjects BI Platform (Central Management Console and BI LaunchPad), an authenticated attacker with low privileges can intercept a serialized object in the parameters and substitute with another malicious serialized object, which leads to deserialization of untrusted data vulnerability. This could highly compromise the Confidentiality, Integrity, and Availability of the system."},{"lang":"es","value":"En algunos flujos de trabajo de la plataforma SAP BusinessObjects BI (Central Management Console y BI LaunchPad), un atacante autenticado con privilegios bajos puede interceptar un objeto serializado en los parámetros y sustituirlo por otro objeto serializado malicioso, lo que conduce a la deserialización de una vulnerabilidad de datos que no son de confianza. Esto podría comprometer en gran medida la confidencialidad, la integridad y la disponibilidad del sistema."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0}]},"weaknesses":[{"source":"cna@sap.com","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:businessobjects_business_intelligence:4.2:-:*:*:*:*:*:*","matchCriteriaId":"36AEA89D-D5B9-4AF3-8329-D239EAA9BB40"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:businessobjects_business_intelligence:4.3:*:*:*:*:*:*:*","matchCriteriaId":"332B91C8-BE8B-4D64-AE82-04FAA946CE83"}]}]}],"references":[{"url":"https://launchpad.support.sap.com/#/notes/3243924","source":"cna@sap.com","tags":["Permissions Required","Vendor Advisory"]},{"url":"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html","source":"cna@sap.com","tags":["Vendor Advisory"]},{"url":"https://launchpad.support.sap.com/#/notes/3243924","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Vendor Advisory"]},{"url":"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}