Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24319: CWE-316: Cleartext Storage of Sensitive Information in Memory in SAP_SE SAP Business One (B1 Client Memory Dump Files)

0
Medium
VulnerabilityCVE-2026-24319cvecve-2026-24319cwe-316
Published: Tue Feb 10 2026 (02/10/2026, 03:03:33 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Business One (B1 Client Memory Dump Files)

Description

CVE-2026-24319 is a medium-severity vulnerability in SAP Business One versions 10. 0 (B1_ON_HANA and SAP-M-BO) where sensitive information is stored in cleartext within client memory dump files. This exposure can lead to unauthorized access and modification of company data if an attacker gains access to these dump files. Exploitation requires local access with high privileges and user interaction, but does not impact system availability. The vulnerability primarily threatens confidentiality and integrity of business-critical data. No known exploits are currently reported in the wild. European organizations using SAP Business One 10. 0 should prioritize securing access to memory dump files and apply any forthcoming patches or mitigations. Countries with significant SAP Business One deployments and critical industries relying on SAP ERP systems are at higher risk. Mitigation includes restricting dump file access, monitoring for unauthorized access, and minimizing privilege levels on client machines.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:26:46 UTC

Technical Analysis

CVE-2026-24319 identifies a vulnerability in SAP Business One (B1 Client Memory Dump Files) versions 10.0 (B1_ON_HANA and SAP-M-BO) where sensitive information is written to memory dump files in cleartext without any obfuscation or encryption. Memory dump files are typically generated when the application crashes or encounters critical errors, capturing the state of the application’s memory for troubleshooting. However, in this case, the dumps inadvertently contain sensitive data such as authentication tokens, credentials, or business-critical information in plaintext. An attacker with local access and high privileges who can trigger or access these dump files could extract this sensitive information, enabling unauthorized operations within the SAP Business One environment, including modification of company data. The vulnerability is classified under CWE-316 (Cleartext Storage of Sensitive Information) and has a CVSS v3.1 score of 5.8, reflecting medium severity. The attack vector is local (AV:L), requiring low attack complexity (AC:L), but high privileges (PR:H) and user interaction (UI:R). The vulnerability impacts confidentiality and integrity but does not affect availability. No public exploits are currently known, and no patches have been linked yet. This issue highlights the risk of sensitive data exposure through diagnostic files, which are often overlooked in security controls.

Potential Impact

For European organizations, the exposure of sensitive information in memory dump files can lead to significant confidentiality breaches and unauthorized data manipulation within SAP Business One environments. Given SAP Business One’s role in managing financial, operational, and customer data for small to medium enterprises, unauthorized access could result in financial fraud, data integrity loss, and regulatory compliance violations such as GDPR breaches. The impact is heightened in sectors where SAP Business One is widely used, including manufacturing, retail, and professional services. Although the vulnerability requires local high-privilege access, insider threats or attackers who gain elevated access through other means could exploit this to escalate privileges or move laterally within networks. The lack of availability impact means business continuity is not directly affected, but the integrity and confidentiality risks could lead to reputational damage and legal consequences. Organizations must consider the sensitivity of data stored in memory and the security of diagnostic files in their risk assessments.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement strict access controls on systems running SAP Business One, ensuring only authorized personnel have high-level privileges capable of accessing memory dump files. Regularly audit and monitor the creation and access of memory dump files to detect unauthorized attempts. Configure SAP Business One and underlying operating systems to limit or disable memory dump generation where feasible, or ensure dumps are securely stored and encrypted. Employ endpoint protection solutions that can detect and prevent unauthorized file access or exfiltration. Educate administrators and users about the risks of sensitive data exposure in diagnostic files and enforce least privilege principles to reduce the risk of privilege escalation. Stay alert for SAP’s official patches or updates addressing this vulnerability and apply them promptly once available. Additionally, implement network segmentation to limit lateral movement if an attacker gains local access. Finally, consider using data loss prevention (DLP) tools to monitor sensitive data leakage from endpoints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2026-01-21T22:15:36.672Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698aaa0b4b57a58fa1c64d26

Added to database: 2/10/2026, 3:46:19 AM

Last enriched: 2/17/2026, 9:26:46 AM

Last updated: 2/21/2026, 12:22:01 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats