FKIE_CVE-2026-24326
Vulnerability from fkie_nvd - Published: 2026-02-10 04:16 - Updated: 2026-02-17 15:13
Severity ?
Summary
Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense & Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.
References
| URL | Tags | ||
|---|---|---|---|
| cna@sap.com | https://me.sap.com/notes/3678009 | Permissions Required | |
| cna@sap.com | https://url.sap/sapsecuritypatchday | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:600:*:*:*:*:*:*:*",
"matchCriteriaId": "78ADAFAC-2C87-4C49-8865-EB1C97B7B5F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:603:*:*:*:*:*:*:*",
"matchCriteriaId": "CD7FBDFA-E462-4BAE-9408-351011A813A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:604:*:*:*:*:*:*:*",
"matchCriteriaId": "B614A1E8-F448-4D31-985B-C4A7C0CB368B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:605:*:*:*:*:*:*:*",
"matchCriteriaId": "127D2BD7-BB9D-4CE0-BB07-F871905B31A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:606:*:*:*:*:*:*:*",
"matchCriteriaId": "98E1223E-1745-4B98-8E3E-F96B3ECAC188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:616:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6DD245-E9C9-4B4D-A1BC-03EB6AC72D20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:617:*:*:*:*:*:*:*",
"matchCriteriaId": "2166F508-E6D6-4115-943C-DB3A542ED1FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:618:*:*:*:*:*:*:*",
"matchCriteriaId": "0867D831-9BF5-4E85-8D18-739A4D815B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:619:*:*:*:*:*:*:*",
"matchCriteriaId": "9FCE5819-11CF-40BA-9AA6-58B5ACC7F5F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:800:*:*:*:*:*:*:*",
"matchCriteriaId": "19551C2A-E648-4984-B8C6-943AB0DD98E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:801:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB489DD-5DBD-4ED1-B960-73EABA12BD41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:802:*:*:*:*:*:*:*",
"matchCriteriaId": "86985075-6564-4905-B863-0FE785DF1060",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:803:*:*:*:*:*:*:*",
"matchCriteriaId": "40CB0220-9467-49B8-9050-368B816ABE18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:804:*:*:*:*:*:*:*",
"matchCriteriaId": "732E1942-ECBF-4FCD-98C7-C7DF361748F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:805:*:*:*:*:*:*:*",
"matchCriteriaId": "00AC39A9-6262-48B5-ACBA-2D214AB97222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:806:*:*:*:*:*:*:*",
"matchCriteriaId": "CAC823D3-3E07-4534-905F-3D1209AE55EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:807:*:*:*:*:*:*:*",
"matchCriteriaId": "433D5F16-FB53-4774-ABA1-73D9618A06E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:808:*:*:*:*:*:*:*",
"matchCriteriaId": "77352DDD-866D-45E1-9995-B0D9AC997623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:s\\/4hana_defense_\\\u0026_security:809:*:*:*:*:*:*:*",
"matchCriteriaId": "FF9592A1-EAD9-4BDB-868A-73306569146F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense \u0026 Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application."
},
{
"lang": "es",
"value": "Debido a una verificaci\u00f3n de autorizaci\u00f3n faltante en las Operaciones Desconectadas de SAP S/4HANA Defense \u0026amp; Security, un atacante con privilegios de usuario podr\u00eda llamar m\u00f3dulos de funci\u00f3n habilitados remotamente para realizar una actualizaci\u00f3n directa en una tabla de base de datos SAP est\u00e1ndar. Esto resulta en un impacto bajo en la integridad, sin impacto en la confidencialidad o disponibilidad de la aplicaci\u00f3n."
}
],
"id": "CVE-2026-24326",
"lastModified": "2026-02-17T15:13:03.900",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "cna@sap.com",
"type": "Primary"
}
]
},
"published": "2026-02-10T04:16:04.950",
"references": [
{
"source": "cna@sap.com",
"tags": [
"Permissions Required"
],
"url": "https://me.sap.com/notes/3678009"
},
{
"source": "cna@sap.com",
"tags": [
"Vendor Advisory"
],
"url": "https://url.sap/sapsecuritypatchday"
}
],
"sourceIdentifier": "cna@sap.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-862"
}
],
"source": "cna@sap.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…