CVE-2026-24309
Received Received - Intake
Authorization Bypass in SAP NetWeaver ABAP Allows Database Modification

Publication date: 2026-03-10

Last updated on: 2026-03-10

Assigner: SAP SE

Description
Due to missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated attacker could execute specific ABAP function module to read, modify or insert entries into the database configuration table of the ABAP system. This unauthorized content change could lead to reduced system performance or interruptions. The vulnerability has low impact on the application's integrity and availability, with no effect on confidentiality.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-10
Last Modified
2026-03-10
Generated
2026-05-07
AI Q&A
2026-03-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sap netweaver_application_server_for_abap *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists because of a missing authorization check in SAP NetWeaver Application Server for ABAP. An authenticated attacker can exploit this by executing a specific ABAP function module that allows them to read, modify, or insert entries into the database configuration table of the ABAP system without proper permission.

This unauthorized modification can lead to changes in the system configuration that may reduce system performance or cause interruptions.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an attacker with authenticated access to alter the database configuration of the ABAP system. This can result in reduced system performance or interruptions in service.

However, the vulnerability has a low impact on the application's integrity and availability, and it does not affect confidentiality.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart