Description
Due to missing authorization check in the SAP ERP Central Component (SAP ECC) and SAP S/4HANA (SAP EHS Management), an attacker could extract hardcoded clear-text credentials and bypass the password authentication check by manipulating user parameters. Upon successful exploitation, the attacker can access, modify or delete certain change pointer information within EHS objects in the application which might further affect the subsequent systems. This vulnerability leads to a low impact on confidentiality and integrity of the application with no affect on the availability.
Published: 2026-01-13
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Credential Disclosure and Authentication Bypass
Action: Apply Patch
AI Analysis

Impact

A missing authorization check in the SAP ERP Central Component and SAP S/4HANA (SAP EHS Management) allows an attacker to read hard‑coded clear‑text credentials and bypass password authentication by manipulating user parameters. Exploitation gives the attacker the ability to access, modify, or delete change pointer information in EHS objects, which can in turn influence downstream systems. The vulnerability is assessed as having low impact on confidentiality and integrity, and no effect on availability.

Affected Systems

The affected vendors are SAP SE with the products SAP ERP Central Component and SAP S/4HANA (SAP EHS Management). Specific version numbers are not provided in the current data, so a vulnerability assessment should target all deployable instances of these products that may contain the exposed credentials.

Risk and Exploitability

The CVSS base score of 6.4 categorizes this issue as medium severity. The EPSS score of less than 1% indicates a very low probability of active exploitation at present, and it is not listed in the CISA KEV catalog. The likely attack vector involves the attacker manipulating user parameters that the application does not adequately authorize. Such a vector typically requires the attacker to have some user or process access that can alter those parameters. Once the check is bypassed, the attacker gains read/write privileges over the affected EHS data structures.

Generated by OpenCVE AI on April 18, 2026 at 06:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply SAP Note 3681523 to patch the missing authorization check
  • Upgrade SAP ERP Central Component and SAP S/4HANA (SAP EHS Management) to a version that incorporates the fix
  • Limit and validate user parameters used by the EHS application, removing any hard‑coded credentials or restricting access to vulnerable endpoints

Generated by OpenCVE AI on April 18, 2026 at 06:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap erp Central Component
Sap s/4hana
Vendors & Products Sap
Sap erp Central Component
Sap s/4hana

Tue, 13 Jan 2026 01:45:00 +0000

Type Values Removed Values Added
Description Due to missing authorization check in the SAP ERP Central Component (SAP ECC) and SAP S/4HANA (SAP EHS Management), an attacker could extract hardcoded clear-text credentials and bypass the password authentication check by manipulating user parameters. Upon successful exploitation, the attacker can access, modify or delete certain change pointer information within EHS objects in the application which might further affect the subsequent systems. This vulnerability leads to a low impact on confidentiality and integrity of the application with no affect on the availability.
Title Missing Authorization check in in SAP ERP Central Component and SAP S/4HANA (SAP EHS Management)
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Sap Erp Central Component S/4hana
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-01-13T19:09:43.485Z

Reserved: 2025-12-09T22:06:43.804Z

Link: CVE-2026-0503

cve-icon Vulnrichment

Updated: 2026-01-13T19:09:40.767Z

cve-icon NVD

Status : Deferred

Published: 2026-01-13T02:15:52.953

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0503

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:00:11Z

Weaknesses