Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0485: CWE-405: Asymmetric Resource Consumption in SAP_SE SAP BusinessObjects BI Platform

0
High
VulnerabilityCVE-2026-0485cvecve-2026-0485cwe-405
Published: Tue Feb 10 2026 (02/10/2026, 03:00:49 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP BusinessObjects BI Platform

Description

CVE-2026-0485 is a high-severity vulnerability in SAP BusinessObjects BI Platform that allows unauthenticated attackers to cause a denial-of-service by crashing the Content Management Server (CMS) through specially crafted requests. Exploitation leads to repeated CMS crashes and automatic restarts, resulting in persistent service disruption and complete unavailability of the CMS. The vulnerability affects multiple versions including ENTERPRISE 430, 2025, and 2027. No confidentiality or integrity impact is reported, and no user interaction or authentication is required. Although no known exploits are currently in the wild, the ease of exploitation and high impact on availability make this a critical concern for organizations relying on SAP BusinessObjects for business intelligence operations. European organizations using these SAP versions should prioritize mitigation to prevent operational disruptions. Specific mitigations include network-level filtering, strict access controls, and monitoring for anomalous CMS requests. Countries with high SAP adoption and critical industries such as Germany, France, and the UK are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:52:45 UTC

Technical Analysis

CVE-2026-0485 is a vulnerability classified under CWE-405 (Asymmetric Resource Consumption) affecting SAP BusinessObjects BI Platform's Content Management Server (CMS). The flaw allows an unauthenticated attacker to send specially crafted requests that exploit resource consumption asymmetry, causing the CMS to crash and subsequently restart automatically. This cycle can be repeated indefinitely, leading to a persistent denial-of-service (DoS) condition that renders the CMS unavailable. The CMS is a core component responsible for managing content and metadata within the SAP BusinessObjects environment, and its unavailability disrupts business intelligence operations. The vulnerability affects multiple versions, including ENTERPRISE 430, 2025, and 2027, indicating a broad impact across recent SAP BusinessObjects deployments. The CVSS v3.1 score of 7.5 reflects high severity, with an attack vector of network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches or known exploits are currently reported, but the vulnerability's nature makes it a significant risk for service disruption. The attack requires no authentication, making it accessible to external threat actors. The vulnerability stems from improper handling of resource-intensive requests, leading to asymmetric resource consumption that overwhelms the CMS process. This can degrade service reliability and availability, impacting business continuity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of SAP BusinessObjects BI Platform services, which are critical for data analytics, reporting, and decision-making processes. A successful attack could cause prolonged outages of the CMS, disrupting business intelligence workflows and potentially delaying critical business operations. Industries relying heavily on SAP BI for regulatory reporting, financial analysis, or operational monitoring—such as banking, manufacturing, telecommunications, and public sector entities—may experience operational and reputational damage. The lack of confidentiality or integrity impact limits data breach risks, but the availability disruption alone can lead to financial losses and compliance challenges, especially under regulations like GDPR that mandate operational resilience. The ease of exploitation without authentication increases the threat surface, making external attackers or automated bots capable of launching denial-of-service attacks. Persistent service disruption could also affect supply chain partners and customers relying on timely business intelligence outputs. Given SAP's widespread adoption in Europe, the potential scale of impact is considerable.

Mitigation Recommendations

To mitigate CVE-2026-0485, European organizations should implement the following specific measures: 1) Deploy network-level access controls such as firewalls and intrusion prevention systems (IPS) to restrict and monitor incoming requests to the CMS, blocking suspicious or malformed traffic patterns indicative of exploitation attempts. 2) Implement rate limiting and request throttling on the CMS endpoints to prevent resource exhaustion from repeated crafted requests. 3) Restrict CMS access to trusted internal networks or VPNs, minimizing exposure to unauthenticated external actors. 4) Monitor CMS logs and network traffic for anomalies such as repeated crashes, restarts, or unusual request patterns that could signal exploitation attempts. 5) Engage with SAP support channels to obtain and apply any forthcoming patches or security updates addressing this vulnerability as soon as they become available. 6) Consider deploying application-layer gateways or web application firewalls (WAF) with custom rules tailored to detect and block exploit attempts targeting this vulnerability. 7) Conduct regular security assessments and penetration testing focused on SAP BusinessObjects environments to identify and remediate potential weaknesses. 8) Develop and test incident response plans specifically for SAP service disruptions to ensure rapid recovery and minimize business impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-12-09T22:06:29.196Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698aaa094b57a58fa1c64c98

Added to database: 2/10/2026, 3:46:17 AM

Last enriched: 2/17/2026, 9:52:45 AM

Last updated: 2/21/2026, 2:16:48 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats