Advisory
A note with CVSS 7.8 for component BC-SYB-PD was released by SAP on 14.06.2022. The correction/advisory 3197005 was described with "[CVE-2022-31590] Potential privilege escalation in SAP PowerDesigner Proxy 16.7" and affects the system type SAP PowerDesigner.
A workaround exists, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance.
The vulnerability addressed is directory traversalcommand injection within SAP PowerDesigner.
Risk specification
SAP PowerDesigner Proxy, allows an attacker with low privileges and local access, with the ability to work around the system’s root disk access restrictions to Write/Create a program file on the system disk root path, which could then be executed with elevated privileges of the application during application start-up or reboot, potentially compromising Confidentiality, Integrity and Availability of the system.Solution
Upgrade your "SAP PowerDesigner Proxy 16.7" to version SP05 PL03 or higher. Although an alternative solution exists, it is advisable to apply the correction! This is the workaround, which was suggested by the SAP security experts: "Manually update service path to have it enclosed with double quotes: Open "Registry Editor" as Administrator Go to registry key: "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sybase PowerDesigner 16 Proxy" Edit the "ImagePath" value to enclose it with double quotes".