Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24327: CWE-862: Missing Authorization in SAP_SE SAP Strategic Enterprise Management (Balanced Scorecard in BSP Application)

0
Medium
VulnerabilityCVE-2026-24327cvecve-2026-24327cwe-862
Published: Tue Feb 10 2026 (02/10/2026, 03:04:46 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Strategic Enterprise Management (Balanced Scorecard in BSP Application)

Description

CVE-2026-24327 is a medium-severity vulnerability in SAP Strategic Enterprise Management's Balanced Scorecard BSP application caused by a missing authorization check. An authenticated attacker with legitimate access could view information they are not authorized to see, impacting confidentiality with no effect on integrity or availability. The vulnerability affects multiple versions of the SEM-BW product line. Exploitation requires network access and low complexity but does not require user interaction. No known exploits are currently in the wild. European organizations using affected SAP SEM versions may face risks of unauthorized data disclosure. Mitigation involves applying SAP patches when available, reviewing and tightening authorization roles, and monitoring access logs for suspicious activity. Countries with significant SAP enterprise deployments and critical industries relying on SAP SEM, such as Germany, France, and the UK, are most likely affected.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:42:24 UTC

Technical Analysis

CVE-2026-24327 is a vulnerability classified under CWE-862 (Missing Authorization) found in SAP Strategic Enterprise Management (SEM), specifically within the Balanced Scorecard component implemented as a Business Server Pages (BSP) application. The flaw arises because the application fails to enforce proper authorization checks on certain functions or data views, allowing an authenticated user to access information beyond their assigned permissions. This vulnerability affects a broad range of SEM-BW versions, from 600 through 800, indicating a long-standing issue across multiple product releases. The CVSS v3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. Since the attacker must already be authenticated, the risk is constrained to insider threats or compromised accounts. No public exploits have been reported, and SAP has not yet published patches at the time of this report. The vulnerability could allow unauthorized disclosure of sensitive business data managed within the Balanced Scorecard application, potentially exposing strategic or performance metrics that could be leveraged for competitive or malicious purposes.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized information disclosure within SAP SEM environments, which are widely used for strategic planning and performance management in large enterprises. The confidentiality breach could expose sensitive corporate data such as key performance indicators, strategic goals, and business metrics. While the impact on operational integrity and availability is nil, the leakage of confidential data could lead to competitive disadvantage, regulatory compliance issues (especially under GDPR if personal data is involved), and reputational damage. Industries such as manufacturing, finance, and utilities that rely heavily on SAP SEM for decision-making are particularly at risk. Since exploitation requires authenticated access, the threat is more pronounced from insider threats or attackers who have compromised legitimate credentials. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks. Organizations with complex SAP role management may find it challenging to detect unauthorized access without enhanced monitoring.

Mitigation Recommendations

1. Apply SAP security patches promptly once released for the affected SEM-BW versions to remediate the missing authorization checks. 2. Conduct a thorough review and audit of SAP user roles and authorizations, focusing on the Balanced Scorecard BSP application, to ensure least privilege principles are enforced. 3. Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 4. Enable detailed logging and monitoring of SAP SEM access, with alerts for anomalous access patterns or privilege escalations. 5. Restrict network access to SAP SEM applications using segmentation and firewall rules to limit exposure to trusted users only. 6. Educate SAP administrators and users about the risks of insider threats and the importance of safeguarding credentials. 7. Consider deploying SAP Enterprise Threat Detection tools or third-party solutions to identify suspicious activities related to authorization bypass attempts. 8. Regularly review and update SAP security policies and conduct penetration testing focused on authorization controls within SAP SEM.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2026-01-21T22:15:36.673Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698aaa0c4b57a58fa1c64d70

Added to database: 2/10/2026, 3:46:20 AM

Last enriched: 2/17/2026, 9:42:24 AM

Last updated: 2/21/2026, 12:16:04 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats