CVE-2024-24739: CWE-862: Missing Authorization in SAP_SE SAP BAM (Bank Account Management)
SAP Bank Account Management (BAM) allows an authenticated user with restricted access to use functions which can result in escalation of privileges with low impact on confidentiality, integrity and availability of the application.
AI Analysis
Technical Summary
CVE-2024-24739 is a medium-severity vulnerability identified in SAP Bank Account Management (BAM), a component used within SAP financial products such as SAP_FIN versions 618 and 730, and S4CORE versions 100 and 101. The vulnerability is classified under CWE-862, which refers to missing authorization. Specifically, this flaw allows an authenticated user with restricted access rights to invoke certain functions within SAP BAM that should be properly restricted. Due to missing or insufficient authorization checks, these users can escalate their privileges beyond their intended scope. The vulnerability has a CVSS 3.1 base score of 6.3, indicating a medium severity level. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L), and privileges at the user level (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact on confidentiality, integrity, and availability is low but present (C:L/I:L/A:L). Although the impact on the core security properties is low, the ability to escalate privileges within a critical financial management system can lead to unauthorized financial operations or data exposure. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was published on February 13, 2024, and is recognized by SAP and CISA. The missing authorization issue means that the system does not adequately verify whether a user has the necessary permissions before allowing access to sensitive functions, which is a fundamental security control failure in enterprise financial software.
Potential Impact
For European organizations, especially those operating in the financial sector or using SAP ERP systems, this vulnerability poses a significant risk. SAP BAM is integral to managing bank accounts and related financial transactions, so unauthorized privilege escalation could allow attackers or malicious insiders to manipulate bank account data, initiate unauthorized transactions, or access sensitive financial information. This could lead to financial fraud, regulatory non-compliance (e.g., GDPR, PSD2), reputational damage, and operational disruptions. Given the interconnected nature of SAP systems in European enterprises, exploitation could cascade to other modules, amplifying the impact. The medium CVSS score reflects that while the vulnerability does not directly cause system-wide compromise or data leakage, the privilege escalation potential in a financial context is critical. European financial institutions are heavily regulated and targeted by cybercriminals, so even low-impact vulnerabilities in financial management software warrant immediate attention. Additionally, the lack of user interaction required for exploitation increases the risk of automated or remote attacks once an attacker has authenticated access, which could be obtained via phishing or credential compromise.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Conduct an immediate audit of user roles and permissions within SAP BAM to ensure the principle of least privilege is strictly enforced, removing unnecessary access rights. 2) Monitor and log all privileged operations within SAP BAM to detect anomalous or unauthorized activities promptly. 3) Apply SAP’s recommended security notes and patches as soon as they become available; in the interim, consider disabling or restricting access to vulnerable functions if feasible. 4) Strengthen authentication mechanisms around SAP BAM, including multi-factor authentication (MFA) for all users with any level of access to financial modules. 5) Employ network segmentation and access controls to limit SAP BAM access only to trusted internal networks and users. 6) Regularly review and update SAP security configurations and conduct penetration testing focused on authorization controls. 7) Educate users on phishing and credential security to reduce the risk of initial access by attackers. These measures go beyond generic advice by focusing on role auditing, monitoring, and access restriction tailored to SAP BAM’s financial context.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Switzerland, Belgium
CVE-2024-24739: CWE-862: Missing Authorization in SAP_SE SAP BAM (Bank Account Management)
Description
SAP Bank Account Management (BAM) allows an authenticated user with restricted access to use functions which can result in escalation of privileges with low impact on confidentiality, integrity and availability of the application.
AI-Powered Analysis
Technical Analysis
CVE-2024-24739 is a medium-severity vulnerability identified in SAP Bank Account Management (BAM), a component used within SAP financial products such as SAP_FIN versions 618 and 730, and S4CORE versions 100 and 101. The vulnerability is classified under CWE-862, which refers to missing authorization. Specifically, this flaw allows an authenticated user with restricted access rights to invoke certain functions within SAP BAM that should be properly restricted. Due to missing or insufficient authorization checks, these users can escalate their privileges beyond their intended scope. The vulnerability has a CVSS 3.1 base score of 6.3, indicating a medium severity level. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L), and privileges at the user level (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact on confidentiality, integrity, and availability is low but present (C:L/I:L/A:L). Although the impact on the core security properties is low, the ability to escalate privileges within a critical financial management system can lead to unauthorized financial operations or data exposure. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was published on February 13, 2024, and is recognized by SAP and CISA. The missing authorization issue means that the system does not adequately verify whether a user has the necessary permissions before allowing access to sensitive functions, which is a fundamental security control failure in enterprise financial software.
Potential Impact
For European organizations, especially those operating in the financial sector or using SAP ERP systems, this vulnerability poses a significant risk. SAP BAM is integral to managing bank accounts and related financial transactions, so unauthorized privilege escalation could allow attackers or malicious insiders to manipulate bank account data, initiate unauthorized transactions, or access sensitive financial information. This could lead to financial fraud, regulatory non-compliance (e.g., GDPR, PSD2), reputational damage, and operational disruptions. Given the interconnected nature of SAP systems in European enterprises, exploitation could cascade to other modules, amplifying the impact. The medium CVSS score reflects that while the vulnerability does not directly cause system-wide compromise or data leakage, the privilege escalation potential in a financial context is critical. European financial institutions are heavily regulated and targeted by cybercriminals, so even low-impact vulnerabilities in financial management software warrant immediate attention. Additionally, the lack of user interaction required for exploitation increases the risk of automated or remote attacks once an attacker has authenticated access, which could be obtained via phishing or credential compromise.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Conduct an immediate audit of user roles and permissions within SAP BAM to ensure the principle of least privilege is strictly enforced, removing unnecessary access rights. 2) Monitor and log all privileged operations within SAP BAM to detect anomalous or unauthorized activities promptly. 3) Apply SAP’s recommended security notes and patches as soon as they become available; in the interim, consider disabling or restricting access to vulnerable functions if feasible. 4) Strengthen authentication mechanisms around SAP BAM, including multi-factor authentication (MFA) for all users with any level of access to financial modules. 5) Employ network segmentation and access controls to limit SAP BAM access only to trusted internal networks and users. 6) Regularly review and update SAP security configurations and conduct penetration testing focused on authorization controls. 7) Educate users on phishing and credential security to reduce the risk of initial access by attackers. These measures go beyond generic advice by focusing on role auditing, monitoring, and access restriction tailored to SAP BAM’s financial context.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2024-01-29T05:13:46.617Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd75a1
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 12:42:26 AM
Last updated: 7/27/2025, 1:31:27 AM
Views: 10
Related Threats
CVE-2025-8583: Inappropriate implementation in Google Chrome
MediumCVE-2025-8582: Insufficient validation of untrusted input in Google Chrome
MediumCVE-2025-8581: Inappropriate implementation in Google Chrome
MediumCVE-2025-8580: Inappropriate implementation in Google Chrome
MediumCVE-2025-8579: Inappropriate implementation in Google Chrome
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.