CVE-2026-23689

7.7 HIGH

📋 TL;DR

This CVE describes a denial-of-service vulnerability in SAP systems where authenticated users can trigger excessive resource consumption by invoking a function module with large loop parameters. The vulnerability allows attackers to render systems unavailable by exhausting system resources. It affects SAP systems with the vulnerable function module accessible to authenticated users.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server ABAP
Versions: Multiple versions - check SAP Note 3703092 for specific affected versions
Operating Systems: All supported SAP operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the vulnerable function module to be remote-enabled and accessible to authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability requiring restart, potentially affecting business operations for extended periods.

🟠

Likely Case

Degraded system performance or temporary unavailability affecting specific services or users.

🟢

If Mitigated

Minimal impact with proper access controls, monitoring, and resource limits in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of the vulnerable function module.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3703092

Vendor Advisory: https://me.sap.com/notes/3703092

Restart Required: Yes

Instructions:

1. Download SAP Note 3703092 from SAP Support Portal
2. Apply the correction instructions provided in the note
3. Restart the affected SAP system
4. Verify the fix is applied successfully

🔧 Temporary Workarounds

Restrict Function Module Access

all

Remove remote-enabled status from vulnerable function modules or restrict access via authorization objects

Use transaction SE37 to check function module properties
Use transaction SU24 to adjust authorization objects

Implement Resource Limits

all

Configure operating system and SAP resource limits to prevent excessive consumption

Configure ulimits on Linux systems
Set profile parameters in SAP instance profiles

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can invoke remote function modules
  • Deploy monitoring and alerting for abnormal resource consumption patterns

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3703092 is applied using transaction SNOTE or check system version against affected versions in the SAP note

Check Version:

Execute 'disp+work -version' in SAP system or check in SAP GUI via System -> Status

Verify Fix Applied:

Verify SAP Note 3703092 is marked as implemented in transaction SNOTE and test function module behavior

📡 Detection & Monitoring

Log Indicators:

  • Abnormally long runtime for function modules
  • High CPU or memory consumption alerts
  • Multiple rapid invocations of same function module

Network Indicators:

  • Unusual frequency of RFC calls to specific function modules
  • Large payloads in RFC communications

SIEM Query:

source="sap_audit_log" AND (event_type="RFC_CALL" OR event_type="FUNCTION_MODULE") AND duration>threshold

🔗 References

📤 Share & Export