Description
Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense & Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.
Published: 2026-02-10
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Integrity Modification
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a missing authorization check in the Disconnected Operations component of SAP S/4HANA Defense & Security. An attacker who already has a standard user account can invoke remote-enabled function modules and perform direct updates to standard SAP database tables. This flaw allows modification of data, resulting in a low-impact integrity breach, with no effect on confidentiality or application availability.

Affected Systems

Affected configurations are all SAP S/4HANA Defense & Security (Disconnected Operations) releases from version 600 through 809, covering the specific sub-releases 603, 604, 605, 606, 616, 617, 618, 619, 800, 801, 802, 803, 804, 805, 806, 807, 808, and 809. The vulnerability is present in every listed release until the highest enumerated version.

Risk and Exploitability

The CVSS base score of 4.3 classifies the vulnerability as low severity. The EPSS score is below 1%, indicating a very low probability of exploitation at the time of assessment. The vulnerability does not appear in the CISA KEV catalog. Exploitation requires an authenticated user with at least standard privileges, so the attack vector is internal, and an attacker must be able to log on to the system and execute the privileged function modules.

Generated by OpenCVE AI on April 17, 2026 at 20:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch provided in SAP Note 3678009.
  • Restrict user privileges so that only trusted accounts can invoke remote-enabled function modules in Disconnected Operations.
  • Enforce proper authorization checks for all function modules accessed by user accounts.

Generated by OpenCVE AI on April 17, 2026 at 20:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap s\/4hana Defense \& Security
CPEs cpe:2.3:a:sap:s\/4hana_defense_\&_security:600:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:603:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:604:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:605:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:606:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:616:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:617:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:618:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:619:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:800:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:801:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:802:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:803:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:804:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:805:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:806:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:807:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:808:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana_defense_\&_security:809:*:*:*:*:*:*:*
Vendors & Products Sap
Sap s\/4hana Defense \& Security

Tue, 10 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Sap Se
Sap Se sap S/4hana Defense & Security (disconnected Operations)
Vendors & Products Sap Se
Sap Se sap S/4hana Defense & Security (disconnected Operations)

Tue, 10 Feb 2026 03:45:00 +0000

Type Values Removed Values Added
Description Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense & Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.
Title Missing authorization check in SAP S/4HANA Defense & Security (Disconnected Operations)
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Sap S\/4hana Defense \& Security
Sap Se Sap S/4hana Defense & Security (disconnected Operations)
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-02-10T16:15:32.371Z

Reserved: 2026-01-21T22:15:36.673Z

Link: CVE-2026-24326

cve-icon Vulnrichment

Updated: 2026-02-10T16:15:28.814Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T04:16:04.950

Modified: 2026-02-17T15:13:03.900

Link: CVE-2026-24326

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:00:12Z

Weaknesses