Impact
A missing authorization check in SAP S/4HANA (Private Cloud and On‑Premise) permits an authenticated user to delete files on the underlying operating system and perform other file‑related operations. The flaw does not affect data confidentiality, has a low impact on integrity, and a low impact on application availability.
Affected Systems
The vulnerability applies to SAP SE’s SAP S/4HANA deployments, both private cloud and on‑premise. Specific affected product versions are not disclosed in the CVE data; the fix is referenced by SAP Note 3703813.
Risk and Exploitability
The CVSS score of 4.9 indicates low severity, and the EPSS score is unavailable while the vulnerability is not listed in the CISA KEV catalog. The attack requires a valid authenticated session; an attacker with user credentials can exploit the missing check to delete or modify operating system files, potentially disrupting system integrity or availability. The overall risk remains low, but the lack of confidentiality compromise limits immediate exposure.
OpenCVE Enrichment