CVE-2026-24326 (GCVE-0-2026-24326)
Vulnerability from cvelistv5 – Published: 2026-02-10 03:04 – Updated: 2026-02-10 16:15
VLAI?
Title
Missing authorization check in SAP S/4HANA Defense & Security (Disconnected Operations)
Summary
Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense & Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.
Severity ?
4.3 (Medium)
CWE
- CWE-862 - Missing Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| SAP_SE | SAP S/4HANA Defense & Security (Disconnected Operations) |
Affected:
EA-DFPS 600
Affected: 603 Affected: 604 Affected: 605 Affected: 606 Affected: 616 Affected: 617 Affected: 618 Affected: 619 Affected: 800 Affected: 801 Affected: 802 Affected: 803 Affected: 804 Affected: 805 Affected: 806 Affected: 807 Affected: 808 Affected: 809 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-24326",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-10T16:15:23.290812Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T16:15:32.371Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SAP S/4HANA Defense \u0026 Security (Disconnected Operations)",
"vendor": "SAP_SE",
"versions": [
{
"status": "affected",
"version": "EA-DFPS 600"
},
{
"status": "affected",
"version": "603"
},
{
"status": "affected",
"version": "604"
},
{
"status": "affected",
"version": "605"
},
{
"status": "affected",
"version": "606"
},
{
"status": "affected",
"version": "616"
},
{
"status": "affected",
"version": "617"
},
{
"status": "affected",
"version": "618"
},
{
"status": "affected",
"version": "619"
},
{
"status": "affected",
"version": "800"
},
{
"status": "affected",
"version": "801"
},
{
"status": "affected",
"version": "802"
},
{
"status": "affected",
"version": "803"
},
{
"status": "affected",
"version": "804"
},
{
"status": "affected",
"version": "805"
},
{
"status": "affected",
"version": "806"
},
{
"status": "affected",
"version": "807"
},
{
"status": "affected",
"version": "808"
},
{
"status": "affected",
"version": "809"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eDue to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense \u0026amp; Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.\u003c/p\u003e"
}
],
"value": "Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense \u0026 Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-862",
"description": "CWE-862: Missing Authorization",
"lang": "eng",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T03:04:39.908Z",
"orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
"shortName": "sap"
},
"references": [
{
"url": "https://me.sap.com/notes/3678009"
},
{
"url": "https://url.sap/sapsecuritypatchday"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Missing authorization check in SAP S/4HANA Defense \u0026 Security (Disconnected Operations)",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
"assignerShortName": "sap",
"cveId": "CVE-2026-24326",
"datePublished": "2026-02-10T03:04:39.908Z",
"dateReserved": "2026-01-21T22:15:36.673Z",
"dateUpdated": "2026-02-10T16:15:32.371Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-24326\",\"sourceIdentifier\":\"cna@sap.com\",\"published\":\"2026-02-10T04:16:04.950\",\"lastModified\":\"2026-02-17T15:13:03.900\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense \u0026 Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.\"},{\"lang\":\"es\",\"value\":\"Debido a una verificaci\u00f3n de autorizaci\u00f3n faltante en las Operaciones Desconectadas de SAP S/4HANA Defense \u0026amp; Security, un atacante con privilegios de usuario podr\u00eda llamar m\u00f3dulos de funci\u00f3n habilitados remotamente para realizar una actualizaci\u00f3n directa en una tabla de base de datos SAP est\u00e1ndar. Esto resulta en un impacto bajo en la integridad, sin impacto en la confidencialidad o disponibilidad de la aplicaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@sap.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"cna@sap.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78ADAFAC-2C87-4C49-8865-EB1C97B7B5F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:603:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7FBDFA-E462-4BAE-9408-351011A813A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:604:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B614A1E8-F448-4D31-985B-C4A7C0CB368B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:605:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"127D2BD7-BB9D-4CE0-BB07-F871905B31A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:606:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E1223E-1745-4B98-8E3E-F96B3ECAC188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:616:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF6DD245-E9C9-4B4D-A1BC-03EB6AC72D20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:617:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2166F508-E6D6-4115-943C-DB3A542ED1FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:618:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0867D831-9BF5-4E85-8D18-739A4D815B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:619:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FCE5819-11CF-40BA-9AA6-58B5ACC7F5F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:800:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19551C2A-E648-4984-B8C6-943AB0DD98E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:801:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AB489DD-5DBD-4ED1-B960-73EABA12BD41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:802:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86985075-6564-4905-B863-0FE785DF1060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:803:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40CB0220-9467-49B8-9050-368B816ABE18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:804:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"732E1942-ECBF-4FCD-98C7-C7DF361748F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:805:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00AC39A9-6262-48B5-ACBA-2D214AB97222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:806:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC823D3-3E07-4534-905F-3D1209AE55EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:807:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"433D5F16-FB53-4774-ABA1-73D9618A06E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:808:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77352DDD-866D-45E1-9995-B0D9AC997623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:s\\\\/4hana_defense_\\\\\u0026_security:809:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9592A1-EAD9-4BDB-868A-73306569146F\"}]}]}],\"references\":[{\"url\":\"https://me.sap.com/notes/3678009\",\"source\":\"cna@sap.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://url.sap/sapsecuritypatchday\",\"source\":\"cna@sap.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-24326\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-10T16:15:23.290812Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-10T16:15:28.814Z\"}}], \"cna\": {\"title\": \"Missing authorization check in SAP S/4HANA Defense \u0026 Security (Disconnected Operations)\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"SAP_SE\", \"product\": \"SAP S/4HANA Defense \u0026 Security (Disconnected Operations)\", \"versions\": [{\"status\": \"affected\", \"version\": \"EA-DFPS 600\"}, {\"status\": \"affected\", \"version\": \"603\"}, {\"status\": \"affected\", \"version\": \"604\"}, {\"status\": \"affected\", \"version\": \"605\"}, {\"status\": \"affected\", \"version\": \"606\"}, {\"status\": \"affected\", \"version\": \"616\"}, {\"status\": \"affected\", \"version\": \"617\"}, {\"status\": \"affected\", \"version\": \"618\"}, {\"status\": \"affected\", \"version\": \"619\"}, {\"status\": \"affected\", \"version\": \"800\"}, {\"status\": \"affected\", \"version\": \"801\"}, {\"status\": \"affected\", \"version\": \"802\"}, {\"status\": \"affected\", \"version\": \"803\"}, {\"status\": \"affected\", \"version\": \"804\"}, {\"status\": \"affected\", \"version\": \"805\"}, {\"status\": \"affected\", \"version\": \"806\"}, {\"status\": \"affected\", \"version\": \"807\"}, {\"status\": \"affected\", \"version\": \"808\"}, {\"status\": \"affected\", \"version\": \"809\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://me.sap.com/notes/3678009\"}, {\"url\": \"https://url.sap/sapsecuritypatchday\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense \u0026 Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eDue to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense \u0026amp; Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"eng\", \"type\": \"CWE\", \"cweId\": \"CWE-862\", \"description\": \"CWE-862: Missing Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"e4686d1a-f260-4930-ac4c-2f5c992778dd\", \"shortName\": \"sap\", \"dateUpdated\": \"2026-02-10T03:04:39.908Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-24326\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-10T16:15:32.371Z\", \"dateReserved\": \"2026-01-21T22:15:36.673Z\", \"assignerOrgId\": \"e4686d1a-f260-4930-ac4c-2f5c992778dd\", \"datePublished\": \"2026-02-10T03:04:39.908Z\", \"assignerShortName\": \"sap\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…