Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24319: CWE-316: Cleartext Storage of Sensitive Information in Memory in SAP_SE SAP Business One (B1 Client Memory Dump Files)

0
Medium
VulnerabilityCVE-2026-24319cvecve-2026-24319cwe-316
Published: Tue Feb 10 2026 (02/10/2026, 03:03:33 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Business One (B1 Client Memory Dump Files)

Description

In SAP Business One, sensitive information is written to the application�s memory dump files without obfuscation. Gaining access to this information could potentially lead to unauthorized operations within the B1 environment, including modification of company data. This issue results in a high impact on confidentiality and integrity, with no impact on availability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:08:09 UTC

Technical Analysis

CVE-2026-24319 is a medium-severity vulnerability identified in SAP Business One, specifically affecting the B1 Client Memory Dump Files in versions B1_ON_HANA 10.0 and SAP-M-BO 10.0. The vulnerability arises from the cleartext storage of sensitive information in application memory dump files without any obfuscation or encryption. Memory dumps are typically generated during application crashes or debugging sessions and may contain critical data such as authentication tokens, credentials, or business-sensitive information. An attacker who gains access to these dump files—requiring local access with high privileges and user interaction—can extract this sensitive information. This exposure can lead to unauthorized operations within the SAP Business One environment, including the modification of company data, thereby compromising both confidentiality and integrity. The vulnerability does not impact system availability. The CVSS 3.1 vector (AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N) indicates that exploitation requires local access, low attack complexity, high privileges, and user interaction, with high impact on confidentiality and integrity but no impact on availability. Currently, there are no known exploits in the wild, and no patches have been linked yet. The issue is classified under CWE-316, which pertains to cleartext storage of sensitive information in memory.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of sensitive business data within SAP Business One environments. If exploited, attackers with local privileged access can extract sensitive information from memory dump files, potentially including credentials or session tokens, which can be leveraged to perform unauthorized operations such as data modification or unauthorized access to business-critical functions. This can lead to financial loss, regulatory compliance violations, and damage to organizational reputation. Since the vulnerability does not affect availability, denial-of-service scenarios are unlikely. However, the requirement for high privileges and user interaction limits the attack surface to insider threats or attackers who have already compromised a system with elevated rights. Organizations with SAP Business One deployments, especially in sectors handling sensitive financial or operational data, face increased risk if local access controls are weak or if memory dump files are not properly secured.

Mitigation Recommendations

To mitigate CVE-2026-24319, organizations should implement strict access controls on systems running SAP Business One to ensure only authorized personnel have local access, especially with elevated privileges. Limit the generation and retention of memory dump files to the minimum necessary for troubleshooting, and securely delete or encrypt these files to prevent unauthorized reading. Monitor and audit access to memory dump files and related directories to detect suspicious activity. Apply the principle of least privilege to reduce the number of users with high-level access. Coordinate with SAP for official patches or updates addressing this vulnerability and deploy them promptly once available. Additionally, consider implementing endpoint detection and response (EDR) solutions to detect anomalous access patterns or attempts to extract sensitive data from memory. Educate administrators and users about the risks of exposing sensitive information through memory dumps and enforce policies to handle such files securely.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2026-01-21T22:15:36.672Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698aaa0b4b57a58fa1c64d26

Added to database: 2/10/2026, 3:46:19 AM

Last enriched: 2/27/2026, 8:08:09 AM

Last updated: 4/5/2026, 7:45:31 PM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses