CVE-2026-0484

6.5 MEDIUM

📋 TL;DR

This vulnerability in SAP NetWeaver ABAP and SAP S/4HANA allows authenticated attackers to modify text data through unauthorized access to a specific transaction code. It affects organizations using vulnerable versions of these SAP products, compromising data integrity without affecting confidentiality or availability.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server ABAP
  • SAP S/4HANA
Versions: Specific versions as detailed in SAP Note 3672622
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; vulnerability exists in standard SAP transactions

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify critical business data, financial records, or configuration settings, leading to operational disruption, financial loss, or compliance violations.

🟠

Likely Case

Malicious insiders or compromised accounts could alter transactional data, master data, or system texts, potentially affecting business processes and reporting accuracy.

🟢

If Mitigated

With proper authorization controls and monitoring, impact is limited to unauthorized text modifications that can be detected and rolled back.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of specific transaction codes

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: As specified in SAP Note 3672622

Vendor Advisory: https://me.sap.com/notes/3672622

Restart Required: Yes

Instructions:

1. Review SAP Note 3672622 for specific patch details. 2. Apply SAP Security Patch Day updates. 3. Restart affected SAP systems. 4. Verify patch application through transaction ST-PI.

🔧 Temporary Workarounds

Transaction Code Restriction

all

Restrict access to vulnerable transaction codes using SAP authorization objects

SU24: Maintain authorization objects for affected transactions
PFCG: Adjust role authorizations

🧯 If You Can't Patch

  • Implement strict authorization controls to limit access to vulnerable transaction codes
  • Enable detailed auditing for text modification activities and monitor for unauthorized changes

🔍 How to Verify

Check if Vulnerable:

Check SAP Note 3672622 applicability using transaction SNOTE or review system version against affected versions list

Check Version:

Transaction SM51 or SM50 to check SAP kernel and application server versions

Verify Fix Applied:

Verify patch application through transaction SPAM or ST-PI, and confirm authorization checks are enforced

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to specific transaction codes
  • Unexpected text modifications in change documents

Network Indicators:

  • Unusual transaction patterns from specific user accounts

SIEM Query:

Search for transaction code STAD with vulnerable transaction patterns and unauthorized user activities

🔗 References

📤 Share & Export