Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-41274: CWE-863 Incorrect Authorization in SAP Disclosure Management

0
Medium
Published: Tue Dec 13 2022 (12/13/2022, 03:11:53 UTC)
Source: CVE
Vendor/Project: SAP
Product: Disclosure Management

Description

SAP Disclosure Management - version 10.1, allows an authenticated attacker to exploit certain misconfigured application endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation can lead to the exposure of data like financial reports.

AI-Powered Analysis

AILast updated: 06/21/2025, 16:25:07 UTC

Technical Analysis

CVE-2022-41274 is a medium-severity vulnerability classified under CWE-863 (Incorrect Authorization) affecting SAP Disclosure Management version 10.1. This vulnerability arises due to misconfigured application endpoints within the SAP Disclosure Management system that are exposed over the network. An attacker who has already authenticated to the system can exploit these misconfigurations to bypass proper authorization checks and gain unauthorized read access to sensitive data. The data at risk primarily includes confidential financial reports and other sensitive disclosure documents managed by the application. Since the vulnerability requires authentication, the attacker must have valid credentials or leverage compromised accounts to exploit the flaw. The issue stems from improper enforcement of access control policies on certain endpoints, allowing authenticated users to access data beyond their privilege level. Although no public exploits are currently known in the wild, the exposure of sensitive financial data could have significant consequences for organizations relying on SAP Disclosure Management for regulatory reporting and financial disclosures. The vulnerability was publicly disclosed in December 2022, and no official patches or updates have been linked in the provided information, indicating that organizations must proactively verify their configurations and access controls to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2022-41274 can be substantial given the critical nature of financial disclosures in compliance with EU regulations such as the GDPR, the Transparency Directive, and other financial reporting mandates. Unauthorized access to sensitive financial reports could lead to data breaches involving confidential corporate financial information, potentially resulting in reputational damage, regulatory penalties, and loss of stakeholder trust. The exposure of such data could also facilitate insider trading or financial fraud if exploited by malicious actors. Since SAP Disclosure Management is widely used by large enterprises and financial institutions in Europe for managing regulatory disclosures, the vulnerability poses a risk to organizations handling sensitive financial data. The requirement for authentication limits the attack surface to insiders or attackers who have compromised credentials, but this does not eliminate the risk given the prevalence of credential theft and phishing attacks. The vulnerability could also impact the integrity of financial reporting processes if unauthorized users manipulate or access data improperly, although the primary issue is unauthorized read access. Availability impact is minimal as the vulnerability does not enable denial of service or data modification.

Mitigation Recommendations

To mitigate CVE-2022-41274, European organizations should take the following specific actions: 1) Conduct a thorough review and audit of SAP Disclosure Management 10.1 configurations, focusing on application endpoint exposure and authorization policies to ensure that access controls are correctly enforced. 2) Implement strict role-based access controls (RBAC) and least privilege principles to limit authenticated user permissions only to necessary functions and data. 3) Monitor and restrict network access to SAP Disclosure Management endpoints using network segmentation and firewall rules to reduce exposure to unauthorized users. 4) Enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 5) Regularly review user accounts and promptly disable or remove inactive or unnecessary accounts to minimize the number of potential attackers with valid credentials. 6) Enable detailed logging and monitoring of access to sensitive disclosure data and endpoints to detect anomalous or unauthorized access attempts. 7) Stay informed about SAP security advisories for any forthcoming patches or updates addressing this vulnerability and apply them promptly once available. 8) Conduct security awareness training for users with access to SAP Disclosure Management to reduce the risk of credential theft or misuse. These targeted measures go beyond generic advice by focusing on configuration audits, access control tightening, and network-level protections specific to the SAP Disclosure Management environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2022-09-21T16:20:14.953Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf77d0

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 4:25:07 PM

Last updated: 12/8/2025, 7:44:42 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2024-7011: CWE-1242: Inclusion of Undocumented Features or Chicken Bits in Sharp Display Solutions, Ltd. NP-CB4500UL, NP-CB4500WL, NP-CB4700UL, NP-P525UL, NP-P525UL+, NP-P525ULG, NP-P525ULJL, NP-P525WL, NP-P525WL+, NP-P525WLG, NP-P525WLJL, NP-CG6500UL, NP-CG6500WL, NP-CG6700UL, NP-P605UL, NP-P605UL+, NP-P605ULG, NP-P605ULJL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC332WJL, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME372WJL, NP-ME382U, NP-ME382UG, NP-ME382UJL, NP-ME402X, NP-ME402XG, NP-ME402XJL, NP-CB4500XL, NP-CG6400UL, NP-CG6400WL, NP-CG6500XL, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CB4600U, NP-CF6600U, NP-P474U, NP-P554U, NP-P554U+, NP-P554UG, NP-P554UJL, NP-CG6600UL, NP-P547UL, NP-P547ULG, NP-P547ULJL, NP-P607UL+, NP-P627UL, NP-P627UL+, NP-P627ULG, NP-P627ULJL, NP-PV710UL-B, NP-PV710UL-B1, NP-PV710UL-W, NP-PV710UL-W+, NP-PV710UL-W1, NP-PV730UL-BJL, NP-PV730UL-WJL, NP-PV800UL-B, NP-PV800UL-B+, NP-PV800UL-B1, NP-PV800UL-BJL, NP-PV800UL-W, NP-PV800UL-W+, NP-PV800UL-W1, NP-PV800UL-WJL, NP-CA4200X, NP-CA4265X, NP-CA4300U, NP-CA4300W, NP-CA4305X, NP-CA4400X, NP-CD2125X, NP-CD2200W, NP-CD2300U, NP-CD2310X, NP-CR2105X, NP-CR2200X, NP-CR2205W, NP-CR2300U, NP-CR2300W, NP-CR2315X, NP-CR2400X, NP-MC333XG, NP-MC363XG, NP-MC393WJL, NP-MC423W, NP-MC423WG, NP-MC453X, NP-MC453X, NP-MC453XG, NP-MC453XJL, NP-ME383WG, NP-ME403U, NP-ME403UG, NP-ME403UJL, NP-ME423W, NP-ME423WG, NP-ME423WJL, NP-ME453X, NP-ME453XG, NP-CB4400USL, NP-CB4400WSL, NP-CB4510UL, NP-CB4510WL, NP-CB4510XL, NP-CB4550USL, NP-CB6700UL, NP-CG6510UL, NP-PE456USL, NP-PE456USLG, NP-PE456USLJL, NP-PE456WSLG, NP-PE506UL, NP-PE506ULG, NP-PE506ULJL, NP-PE506WL, NP-PE506WLG, NP-PE506WLJL

Medium
VulnerabilityMon Dec 08 2025

CVE-2025-14222: SQL Injection in code-projects Employee Profile Management System

Medium
VulnerabilityMon Dec 08 2025

CVE-2025-14221: Cross Site Scripting in SourceCodester Online Banking System

Medium
VulnerabilityMon Dec 08 2025

CVE-2025-14219: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store

Medium
VulnerabilityMon Dec 08 2025

CVE-2024-52702: n/a

Medium
VulnerabilityMon Dec 08 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats