Description
Due to a missing authorization check in SAP ERP and SAP S/4HANA (Private Cloud and On-Premise), an authenticated attacker could execute a particular ABAP report to overwrite any existing eight?character executable ABAP report without authorization. If the overwritten report is subsequently executed, the intended functionality could become unavailable. Successful exploitation impacts availability, with a limited impact on integrity confined to the affected report, while confidentiality remains unaffected.
Published: 2026-04-14
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Disruption of SAP ERP and SAP S/4 HANA availability by overwriting executable ABAP reports
Action: Apply Patch
AI Analysis

Impact

A missing authorization check in SAP ERP and SAP S/4 HANA allows an authenticated attacker to execute a specific ABAP report that can overwrite any existing eight‑character executable ABAP report without the necessary authorization. The weakness is categorized as CWE‑862 (Missing Authorization). Once the overwritten report is run, its intended functionality can be lost, which results in a service disruption for the affected functionality. The integrity impact is restricted to the overwritten report, and no data confidentiality is compromised.

Affected Systems

The vulnerability affects SAP’s ERP and SAP S/4 HANA systems, both in private cloud and on‑premise deployments. The CNA SAP SE has identified these products as impacted. Specific affected versions are not listed, so all running installations of these products could be at risk if they have not applied the available patch.

Risk and Exploitability

The CVSS base score of 7.1 indicates a medium severity level. EPSS data is unavailable and the vulnerability is not included in CISA’s KEV catalog, suggesting no publicly known exploits at this time. The primary attack vector is inferred to be an authenticated user in the SAP environment, as the missing authorization check only protects against users who appear to be authorized. Exploitation requires that the attacker possess valid credentials and sufficient rights to execute the vulnerable ABAP report. The impact after exploitation is limited to the availability of the overwritten report and its constituent functionality.

Generated by OpenCVE AI on April 14, 2026 at 02:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the SAP security patch available at https://me.sap.com/notes/3731908
  • Verify that your SAP ERP or SAP S/4 HANA installation is running the patched version as of the latest SAP security patch day
  • If unable to apply the patch immediately, restrict or disable the vulnerable ABAP report and monitor for unauthorized attempts

Generated by OpenCVE AI on April 14, 2026 at 02:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap erp
Sap s/4 Hana
Vendors & Products Sap
Sap erp
Sap s/4 Hana

Tue, 14 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Description Due to a missing authorization check in SAP ERP and SAP S/4HANA (Private Cloud and On-Premise), an authenticated attacker could execute a particular ABAP report to overwrite any existing eight?character executable ABAP report without authorization. If the overwritten report is subsequently executed, the intended functionality could become unavailable. Successful exploitation impacts availability, with a limited impact on integrity confined to the affected report, while confidentiality remains unaffected.
Title Missing Authorization check in SAP ERP and SAP S/4 HANA (Private Cloud and On-Premise)
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-04-14T13:14:17.750Z

Reserved: 2026-03-26T19:02:45.982Z

Link: CVE-2026-34256

cve-icon Vulnrichment

Updated: 2026-04-14T13:09:04.258Z

cve-icon NVD

Status : Received

Published: 2026-04-14T01:16:03.530

Modified: 2026-04-14T01:16:03.530

Link: CVE-2026-34256

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:31:20Z

Weaknesses