CVE-2026-24310
Received Received - Intake
Missing Authorization in SAP NetWeaver ABAP Allows Data Disclosure

Publication date: 2026-03-10

Last updated on: 2026-03-10

Assigner: SAP SE

Description
Due to missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated attacker could execute specific ABAP function module and read the sensitive information from database catalog of the ABAP system. This vulnerability has low impact on the application's confidentiality with no effect on the integrity and availability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-10
Last Modified
2026-03-10
Generated
2026-05-07
AI Q&A
2026-03-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sap netweaver_application_server_for_abap *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists due to a missing authorization check in SAP NetWeaver Application Server for ABAP. It allows an authenticated attacker to execute a specific ABAP function module and read sensitive information from the database catalog of the ABAP system.

The vulnerability primarily affects confidentiality but has no impact on the integrity or availability of the system.


How can this vulnerability impact me? :

An attacker who is authenticated on the SAP NetWeaver Application Server for ABAP could exploit this vulnerability to access sensitive information stored in the database catalog.

The impact on confidentiality is considered low, and there is no effect on the integrity or availability of the application.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart