Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0490: CWE-862: Missing Authorization in SAP_SE SAP BusinessObjects BI Platform

0
High
VulnerabilityCVE-2026-0490cvecve-2026-0490cwe-862
Published: Tue Feb 10 2026 (02/10/2026, 03:01:20 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP BusinessObjects BI Platform

Description

CVE-2026-0490 is a high-severity vulnerability in SAP BusinessObjects BI Platform that allows unauthenticated attackers to send crafted network requests to a trusted endpoint, bypassing authentication. This flaw leads to a denial of service by preventing legitimate users from accessing the platform, impacting availability but not confidentiality or integrity. The vulnerability affects multiple versions, including ENTERPRISE 430, 2025, and 2027. It requires no authentication or user interaction and can be exploited remotely over the network. Although no known exploits are currently in the wild, the high CVSS score of 7. 5 reflects the significant availability impact. European organizations relying on SAP BusinessObjects for business intelligence and reporting are at risk of operational disruption. Mitigation involves applying vendor patches once available, restricting network access to trusted endpoints, and monitoring for unusual request patterns. Countries with high SAP adoption and critical industries using SAP BI platforms are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:39:27 UTC

Technical Analysis

CVE-2026-0490 is a missing authorization vulnerability (CWE-862) in the SAP BusinessObjects BI Platform, specifically impacting versions ENTERPRISE 430, 2025, and 2027. The vulnerability allows an unauthenticated attacker to craft a specific network request targeting a trusted endpoint within the platform, effectively bypassing authentication mechanisms. This unauthorized access does not expose confidential data or allow modification of data, but it disrupts service availability by preventing legitimate users from accessing the platform. The flaw stems from insufficient authorization checks on critical endpoints, enabling attackers to trigger denial of service conditions remotely without any privileges or user interaction. The CVSS 3.1 base score of 7.5 reflects a high severity due to the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to organizations relying on SAP BusinessObjects for business intelligence operations. The lack of patches at the time of reporting necessitates immediate compensating controls to mitigate potential exploitation.

Potential Impact

For European organizations, the primary impact of CVE-2026-0490 is operational disruption due to denial of service on SAP BusinessObjects BI Platform, which is widely used for critical business intelligence and reporting functions. This can lead to significant downtime, affecting decision-making processes, financial reporting, and operational analytics. Industries such as manufacturing, finance, telecommunications, and public sector entities that rely heavily on SAP BI platforms may experience degraded service availability, potentially causing cascading effects on business continuity. Although confidentiality and integrity are not directly compromised, the inability to access BI data can hinder compliance reporting and strategic planning. The attack's remote and unauthenticated nature increases the risk of widespread exploitation, especially in environments with exposed or poorly segmented SAP infrastructure. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

1. Immediately restrict network access to SAP BusinessObjects BI Platform endpoints to trusted internal networks and VPNs, blocking all unnecessary external access. 2. Implement strict firewall rules and network segmentation to isolate SAP BI servers from untrusted networks and limit exposure. 3. Monitor network traffic for unusual or malformed requests targeting SAP BI endpoints, using intrusion detection/prevention systems with custom signatures if possible. 4. Apply SAP vendor patches or security updates promptly once released for the affected versions (ENTERPRISE 430, 2025, 2027). 5. Conduct regular audits of SAP BI platform configurations and access controls to ensure no unauthorized endpoints are exposed. 6. Educate IT and security teams about this vulnerability to enhance incident response readiness. 7. Consider deploying web application firewalls (WAF) with rules tailored to detect and block unauthorized requests to SAP BI endpoints. 8. Maintain up-to-date backups and disaster recovery plans to mitigate the impact of potential denial of service incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-12-09T22:06:33.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698aaa094b57a58fa1c64ca4

Added to database: 2/10/2026, 3:46:17 AM

Last enriched: 2/17/2026, 9:39:27 AM

Last updated: 2/21/2026, 12:17:37 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats