Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0486: CWE-862: Missing Authorization in SAP_SE ABAP based SAP systems

0
Medium
VulnerabilityCVE-2026-0486cvecve-2026-0486cwe-862
Published: Tue Feb 10 2026 (02/10/2026, 03:00:59 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: ABAP based SAP systems

Description

CVE-2026-0486 is a medium severity vulnerability affecting ABAP based SAP systems where a remote-enabled function module fails to perform necessary authorization checks for authenticated users. This results in unauthorized disclosure of system information, impacting confidentiality with no effect on integrity or availability. The vulnerability affects specific versions including ST-PI 2005_1_700, 2008_1_710, 740, and 758. Exploitation requires network access and authenticated user privileges but no user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses a risk of information leakage that could aid further attacks. European organizations using these SAP versions should prioritize patching or mitigating this issue to prevent unauthorized data exposure. Countries with significant SAP deployments, such as Germany and the UK, are particularly at risk. Mitigation involves strict access control reviews, monitoring for unusual access patterns, and applying SAP security notes once available. Given the medium CVSS score of 5. 0, the threat is moderate but should not be overlooked due to the critical role SAP systems play in enterprise operations.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:47:12 UTC

Technical Analysis

CVE-2026-0486 is a vulnerability classified under CWE-862 (Missing Authorization) that affects ABAP based SAP systems. The issue arises because a remote-enabled function module within these SAP systems does not enforce proper authorization checks for authenticated users. This flaw allows users with valid credentials to access system information that should otherwise be restricted. The vulnerability impacts specific SAP versions, including ST-PI 2005_1_700, 2008_1_710, 740, and 758. The attack vector is network-based, requiring the attacker to have authenticated access but no additional user interaction. The vulnerability leads to unauthorized disclosure of system information, which can be leveraged by attackers for reconnaissance or to facilitate further attacks. However, it does not affect the integrity or availability of the system. The CVSS v3.1 base score is 5.0, reflecting a medium severity level due to the limited confidentiality impact and the requirement for authentication. No public exploits have been reported yet, but the vulnerability's presence in widely used SAP systems makes it a concern for organizations relying on these platforms. SAP has not yet published patches, so organizations must rely on compensating controls until updates are available.

Potential Impact

For European organizations, the primary impact of CVE-2026-0486 is the unauthorized disclosure of sensitive system information within SAP environments. This can lead to increased risk of targeted attacks, as attackers may gain insights into system configurations, user roles, or other internal details that facilitate privilege escalation or lateral movement. While the vulnerability does not compromise data integrity or system availability, the leakage of system information can undermine overall security posture and compliance with data protection regulations such as GDPR. Organizations in sectors heavily reliant on SAP, including manufacturing, finance, and logistics, may face operational risks if attackers exploit this vulnerability to gather intelligence. Additionally, the requirement for authenticated access means insider threats or compromised credentials could be leveraged to exploit this flaw. The medium severity rating indicates a moderate risk level, but given SAP's critical role in enterprise resource planning across Europe, the impact could be significant if combined with other vulnerabilities or attack vectors.

Mitigation Recommendations

1. Conduct a thorough review of user access rights within SAP systems to ensure that only authorized personnel have access to sensitive function modules. 2. Implement strict authentication and session management policies to reduce the risk of credential compromise. 3. Monitor SAP system logs and network traffic for unusual access patterns or attempts to invoke remote-enabled function modules unexpectedly. 4. Apply SAP security notes and patches promptly once they become available for the affected versions. 5. Use SAP's built-in authorization concepts to enforce the principle of least privilege, restricting access to function modules based on job roles. 6. Consider deploying network segmentation and firewall rules to limit access to SAP systems from untrusted networks. 7. Educate SAP administrators and users about the risks associated with this vulnerability and the importance of secure credential management. 8. If patching is delayed, implement compensating controls such as enhanced monitoring and temporary access restrictions to mitigate risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-12-09T22:06:30.443Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698aaa094b57a58fa1c64c9c

Added to database: 2/10/2026, 3:46:17 AM

Last enriched: 2/17/2026, 9:47:12 AM

Last updated: 2/21/2026, 12:16:35 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats