CVE-2026-24326 (GCVE-0-2026-24326)

Vulnerability from cvelistv5 – Published: 2026-02-10 03:04 – Updated: 2026-02-10 16:15
VLAI?
Title
Missing authorization check in SAP S/4HANA Defense & Security (Disconnected Operations)
Summary
Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense & Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.
CWE
Assigner
sap
Impacted products
Vendor Product Version
SAP_SE SAP S/4HANA Defense & Security (Disconnected Operations) Affected: EA-DFPS 600
Affected: 603
Affected: 604
Affected: 605
Affected: 606
Affected: 616
Affected: 617
Affected: 618
Affected: 619
Affected: 800
Affected: 801
Affected: 802
Affected: 803
Affected: 804
Affected: 805
Affected: 806
Affected: 807
Affected: 808
Affected: 809
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-24326",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T16:15:23.290812Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T16:15:32.371Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SAP S/4HANA Defense \u0026 Security (Disconnected Operations)",
          "vendor": "SAP_SE",
          "versions": [
            {
              "status": "affected",
              "version": "EA-DFPS 600"
            },
            {
              "status": "affected",
              "version": "603"
            },
            {
              "status": "affected",
              "version": "604"
            },
            {
              "status": "affected",
              "version": "605"
            },
            {
              "status": "affected",
              "version": "606"
            },
            {
              "status": "affected",
              "version": "616"
            },
            {
              "status": "affected",
              "version": "617"
            },
            {
              "status": "affected",
              "version": "618"
            },
            {
              "status": "affected",
              "version": "619"
            },
            {
              "status": "affected",
              "version": "800"
            },
            {
              "status": "affected",
              "version": "801"
            },
            {
              "status": "affected",
              "version": "802"
            },
            {
              "status": "affected",
              "version": "803"
            },
            {
              "status": "affected",
              "version": "804"
            },
            {
              "status": "affected",
              "version": "805"
            },
            {
              "status": "affected",
              "version": "806"
            },
            {
              "status": "affected",
              "version": "807"
            },
            {
              "status": "affected",
              "version": "808"
            },
            {
              "status": "affected",
              "version": "809"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eDue to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense \u0026amp; Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.\u003c/p\u003e"
            }
          ],
          "value": "Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense \u0026 Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "CWE-862: Missing Authorization",
              "lang": "eng",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-10T03:04:39.908Z",
        "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
        "shortName": "sap"
      },
      "references": [
        {
          "url": "https://me.sap.com/notes/3678009"
        },
        {
          "url": "https://url.sap/sapsecuritypatchday"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Missing authorization check in SAP S/4HANA Defense \u0026 Security (Disconnected Operations)",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
    "assignerShortName": "sap",
    "cveId": "CVE-2026-24326",
    "datePublished": "2026-02-10T03:04:39.908Z",
    "dateReserved": "2026-01-21T22:15:36.673Z",
    "dateUpdated": "2026-02-10T16:15:32.371Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-24326\",\"sourceIdentifier\":\"cna@sap.com\",\"published\":\"2026-02-10T04:16:04.950\",\"lastModified\":\"2026-02-17T15:13:03.900\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense \u0026 Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.\"},{\"lang\":\"es\",\"value\":\"Debido a una verificaci\u00f3n de autorizaci\u00f3n faltante en las Operaciones Desconectadas de SAP S/4HANA Defense \u0026amp; Security, un atacante con privilegios de usuario podr\u00eda llamar m\u00f3dulos de funci\u00f3n habilitados remotamente para realizar una actualizaci\u00f3n directa en una tabla de base de datos SAP est\u00e1ndar. Esto resulta en un impacto bajo en la integridad, sin impacto en la confidencialidad o disponibilidad de la aplicaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@sap.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"cna@sap.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78ADAFAC-2C87-4C49-8865-EB1C97B7B5F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:603:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7FBDFA-E462-4BAE-9408-351011A813A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:604:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B614A1E8-F448-4D31-985B-C4A7C0CB368B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:605:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"127D2BD7-BB9D-4CE0-BB07-F871905B31A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:606:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E1223E-1745-4B98-8E3E-F96B3ECAC188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:616:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF6DD245-E9C9-4B4D-A1BC-03EB6AC72D20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:617:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2166F508-E6D6-4115-943C-DB3A542ED1FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:618:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0867D831-9BF5-4E85-8D18-739A4D815B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:619:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FCE5819-11CF-40BA-9AA6-58B5ACC7F5F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:800:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19551C2A-E648-4984-B8C6-943AB0DD98E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:801:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AB489DD-5DBD-4ED1-B960-73EABA12BD41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:802:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86985075-6564-4905-B863-0FE785DF1060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:803:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40CB0220-9467-49B8-9050-368B816ABE18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:804:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"732E1942-ECBF-4FCD-98C7-C7DF361748F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:805:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00AC39A9-6262-48B5-ACBA-2D214AB97222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:806:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC823D3-3E07-4534-905F-3D1209AE55EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:807:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"433D5F16-FB53-4774-ABA1-73D9618A06E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:808:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77352DDD-866D-45E1-9995-B0D9AC997623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:809:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9592A1-EAD9-4BDB-868A-73306569146F\"}]}]}],\"references\":[{\"url\":\"https://me.sap.com/notes/3678009\",\"source\":\"cna@sap.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://url.sap/sapsecuritypatchday\",\"source\":\"cna@sap.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-24326\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-10T16:15:23.290812Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-10T16:15:28.814Z\"}}], \"cna\": {\"title\": \"Missing authorization check in SAP S/4HANA Defense \u0026 Security (Disconnected Operations)\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"SAP_SE\", \"product\": \"SAP S/4HANA Defense \u0026 Security (Disconnected Operations)\", \"versions\": [{\"status\": \"affected\", \"version\": \"EA-DFPS 600\"}, {\"status\": \"affected\", \"version\": \"603\"}, {\"status\": \"affected\", \"version\": \"604\"}, {\"status\": \"affected\", \"version\": \"605\"}, {\"status\": \"affected\", \"version\": \"606\"}, {\"status\": \"affected\", \"version\": \"616\"}, {\"status\": \"affected\", \"version\": \"617\"}, {\"status\": \"affected\", \"version\": \"618\"}, {\"status\": \"affected\", \"version\": \"619\"}, {\"status\": \"affected\", \"version\": \"800\"}, {\"status\": \"affected\", \"version\": \"801\"}, {\"status\": \"affected\", \"version\": \"802\"}, {\"status\": \"affected\", \"version\": \"803\"}, {\"status\": \"affected\", \"version\": \"804\"}, {\"status\": \"affected\", \"version\": \"805\"}, {\"status\": \"affected\", \"version\": \"806\"}, {\"status\": \"affected\", \"version\": \"807\"}, {\"status\": \"affected\", \"version\": \"808\"}, {\"status\": \"affected\", \"version\": \"809\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://me.sap.com/notes/3678009\"}, {\"url\": \"https://url.sap/sapsecuritypatchday\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense \u0026 Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eDue to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense \u0026amp; Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"eng\", \"type\": \"CWE\", \"cweId\": \"CWE-862\", \"description\": \"CWE-862: Missing Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"e4686d1a-f260-4930-ac4c-2f5c992778dd\", \"shortName\": \"sap\", \"dateUpdated\": \"2026-02-10T03:04:39.908Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2026-24326\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-10T16:15:32.371Z\", \"dateReserved\": \"2026-01-21T22:15:36.673Z\", \"assignerOrgId\": \"e4686d1a-f260-4930-ac4c-2f5c992778dd\", \"datePublished\": \"2026-02-10T03:04:39.908Z\", \"assignerShortName\": \"sap\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…