Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23685: CWE-502: Deserialization of Untrusted Data in SAP_SE SAP NetWeaver (JMS service)

0
Medium
VulnerabilityCVE-2026-23685cvecve-2026-23685cwe-502
Published: Tue Feb 10 2026 (02/10/2026, 03:02:27 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver (JMS service)

Description

CVE-2026-23685 is a deserialization vulnerability in the SAP NetWeaver JMS service affecting version J2EE-FRMW 7. 50. An attacker with local administrator privileges can submit crafted serialized data that triggers unintended behavior during internal processing, leading to denial of service. The vulnerability impacts system availability but does not affect confidentiality or integrity. Exploitation requires high privileges and no user interaction. The CVSS score is 4. 4 (medium severity), reflecting the limited attack vector and impact scope. No known exploits are currently reported in the wild. European organizations using SAP NetWeaver in critical infrastructure or enterprise environments should prioritize patching and monitoring to prevent service disruption.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:37:03 UTC

Technical Analysis

CVE-2026-23685 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) found in the SAP NetWeaver JMS (Java Message Service) component, specifically in version J2EE-FRMW 7.50. The flaw arises because the JMS service improperly handles deserialization of data submitted by an authenticated administrator with local access. When specially crafted serialized content is processed, it can cause the internal application logic to behave unexpectedly, resulting in denial of service (DoS) conditions. This vulnerability does not compromise confidentiality or integrity but severely impacts availability by potentially crashing or destabilizing the JMS service or the broader SAP NetWeaver platform. Exploitation requires the attacker to have local administrator privileges, limiting remote exploitation possibilities. No user interaction is needed once the attacker has access. The CVSS v3.1 score of 4.4 reflects the medium severity due to the high privilege requirement and local access vector, but significant impact on availability. No public exploits or patches are currently available, indicating the need for proactive mitigation and monitoring.

Potential Impact

For European organizations, the primary impact is on the availability of SAP NetWeaver services, which are often critical for enterprise resource planning (ERP), supply chain management, and other business operations. A denial of service could disrupt business continuity, causing operational downtime and financial losses. Since confidentiality and integrity are not affected, data breaches or manipulation are unlikely from this vulnerability alone. However, the requirement for local administrator access means that the threat is more relevant in scenarios where insider threats or compromised administrative accounts exist. Industries relying heavily on SAP NetWeaver, such as manufacturing, finance, and public sector entities across Europe, could face significant operational disruptions if this vulnerability is exploited. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the strategic importance of SAP systems in European enterprises.

Mitigation Recommendations

Organizations should immediately review and restrict local administrator access to SAP NetWeaver servers, ensuring only trusted personnel have such privileges. Implement strict access controls and monitoring to detect any unauthorized or suspicious activity involving administrative accounts. Since no patches are currently available, consider isolating the affected JMS service or limiting its exposure within the network to reduce attack surface. Employ application whitelisting and runtime application self-protection (RASP) mechanisms where possible to detect anomalous deserialization attempts. Regularly audit and update SAP NetWeaver configurations to follow security best practices. Prepare incident response plans to quickly address potential denial of service events. Stay informed on SAP security advisories for forthcoming patches or mitigations related to this CVE.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2026-01-14T18:26:17.297Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698aaa0b4b57a58fa1c64d0e

Added to database: 2/10/2026, 3:46:19 AM

Last enriched: 2/17/2026, 9:37:03 AM

Last updated: 2/21/2026, 12:20:55 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats