Description
Due to missing authorization check in SAP S/4HANA Condition Maintenance, an authenticated attacker could gain unauthorized access to view and modify condition table records, resulting in low impact on the confidentiality and integrity of the data. Additionally, this vulnerability may prevent the legitimate user from accessing the records, causing low impact on application availability.
Published: 2026-05-12
Score: 6.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is caused by a missing authorization check in the SAP S/4HANA Condition Maintenance module. An authenticated attacker who has valid user credentials can view and modify condition table records without being granted the appropriate permissions. The impact on data confidentiality and integrity is low, but the attacker can still alter business logic and potentially disrupt processes. Additionally, legitimate users may experience minor availability loss if the manipulated records impede normal operations.

Affected Systems

The affected system is SAP S/4HANA Condition Maintenance. No specific version details are provided; the issue applies to all deployments of this product.

Risk and Exploitability

The CVSS score of 6.3 indicates medium severity. Exploitation requires authenticated access, so it may be less attractive to attackers who do not already hold valid credentials. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, implying no known widespread exploitation. Nonetheless, authenticated users with sufficient privileges can cause unauthorized data manipulation and minor availability impacts.

Generated by OpenCVE AI on May 12, 2026 at 04:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the SAP security patch referenced by SAP Note 3718083 to add the missing authorization check.
  • If the patch cannot be applied immediately, limit the authorization objects for users accessing Condition Maintenance and regularly review their permissions to prevent unauthorized changes.
  • Monitor and log attempts to access Condition Maintenance, and investigate any suspicious activity to detect potential misuse.

Generated by OpenCVE AI on May 12, 2026 at 04:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Sap Se
Sap Se sap S/4hana Condition Maintenance
Vendors & Products Sap Se
Sap Se sap S/4hana Condition Maintenance

Tue, 12 May 2026 03:00:00 +0000

Type Values Removed Values Added
Description Due to missing authorization check in SAP S/4HANA Condition Maintenance, an authenticated attacker could gain unauthorized access to view and modify condition table records, resulting in low impact on the confidentiality and integrity of the data. Additionally, this vulnerability may prevent the legitimate user from accessing the records, causing low impact on application availability.
Title Missing Authorization check in SAP S/4HANA Condition Maintenance
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}


Subscriptions

Sap Se Sap S/4hana Condition Maintenance
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-05-12T02:21:18.130Z

Reserved: 2026-04-09T17:29:44.663Z

Link: CVE-2026-40133

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T03:16:12.177

Modified: 2026-05-12T03:16:12.177

Link: CVE-2026-40133

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T09:21:59Z

Weaknesses