Skip to main content

CVE-2024-24739: CWE-862: Missing Authorization in SAP_SE SAP BAM (Bank Account Management)

Medium
VulnerabilityCVE-2024-24739cvecve-2024-24739cwe-862
Published: Tue Feb 13 2024 (02/13/2024, 02:34:17 UTC)
Source: CVE
Vendor/Project: SAP_SE
Product: SAP BAM (Bank Account Management)

Description

SAP Bank Account Management (BAM) allows an authenticated user with restricted access to use functions which can result in escalation of privileges with low impact on confidentiality, integrity and availability of the application.

AI-Powered Analysis

AILast updated: 07/05/2025, 00:42:26 UTC

Technical Analysis

CVE-2024-24739 is a medium-severity vulnerability identified in SAP Bank Account Management (BAM), a component used within SAP financial products such as SAP_FIN versions 618 and 730, and S4CORE versions 100 and 101. The vulnerability is classified under CWE-862, which refers to missing authorization. Specifically, this flaw allows an authenticated user with restricted access rights to invoke certain functions within SAP BAM that should be properly restricted. Due to missing or insufficient authorization checks, these users can escalate their privileges beyond their intended scope. The vulnerability has a CVSS 3.1 base score of 6.3, indicating a medium severity level. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L), and privileges at the user level (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact on confidentiality, integrity, and availability is low but present (C:L/I:L/A:L). Although the impact on the core security properties is low, the ability to escalate privileges within a critical financial management system can lead to unauthorized financial operations or data exposure. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was published on February 13, 2024, and is recognized by SAP and CISA. The missing authorization issue means that the system does not adequately verify whether a user has the necessary permissions before allowing access to sensitive functions, which is a fundamental security control failure in enterprise financial software.

Potential Impact

For European organizations, especially those operating in the financial sector or using SAP ERP systems, this vulnerability poses a significant risk. SAP BAM is integral to managing bank accounts and related financial transactions, so unauthorized privilege escalation could allow attackers or malicious insiders to manipulate bank account data, initiate unauthorized transactions, or access sensitive financial information. This could lead to financial fraud, regulatory non-compliance (e.g., GDPR, PSD2), reputational damage, and operational disruptions. Given the interconnected nature of SAP systems in European enterprises, exploitation could cascade to other modules, amplifying the impact. The medium CVSS score reflects that while the vulnerability does not directly cause system-wide compromise or data leakage, the privilege escalation potential in a financial context is critical. European financial institutions are heavily regulated and targeted by cybercriminals, so even low-impact vulnerabilities in financial management software warrant immediate attention. Additionally, the lack of user interaction required for exploitation increases the risk of automated or remote attacks once an attacker has authenticated access, which could be obtained via phishing or credential compromise.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Conduct an immediate audit of user roles and permissions within SAP BAM to ensure the principle of least privilege is strictly enforced, removing unnecessary access rights. 2) Monitor and log all privileged operations within SAP BAM to detect anomalous or unauthorized activities promptly. 3) Apply SAP’s recommended security notes and patches as soon as they become available; in the interim, consider disabling or restricting access to vulnerable functions if feasible. 4) Strengthen authentication mechanisms around SAP BAM, including multi-factor authentication (MFA) for all users with any level of access to financial modules. 5) Employ network segmentation and access controls to limit SAP BAM access only to trusted internal networks and users. 6) Regularly review and update SAP security configurations and conduct penetration testing focused on authorization controls. 7) Educate users on phishing and credential security to reduce the risk of initial access by attackers. These measures go beyond generic advice by focusing on role auditing, monitoring, and access restriction tailored to SAP BAM’s financial context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2024-01-29T05:13:46.617Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd75a1

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 12:42:26 AM

Last updated: 7/27/2025, 1:31:27 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats