CVE-2026-24322

7.7 HIGH

📋 TL;DR

SAP Solution Tools Plug-In (ST-PI) contains an authorization bypass vulnerability where authenticated users can access sensitive information without proper permission checks. This affects organizations using SAP ST-PI and compromises confidentiality of sensitive data. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • SAP Solution Tools Plug-In (ST-PI)
Versions: Specific versions not detailed in CVE; check SAP Note 3705882 for exact affected versions
Operating Systems: All platforms running SAP ST-PI
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; vulnerability exists in default configuration of affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with authenticated access could exfiltrate sensitive business data, customer information, or system configuration details, leading to data breaches and regulatory violations.

🟠

Likely Case

Internal users or compromised accounts accessing unauthorized sensitive information, potentially leading to data leakage and privacy violations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized users only accessing data they're permitted to see.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3705882 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3705882

Restart Required: Yes

Instructions:

1. Review SAP Note 3705882 for affected versions and patches. 2. Apply the relevant SAP security patch. 3. Restart affected SAP systems. 4. Verify patch application through transaction SPAM/SAINT.

🔧 Temporary Workarounds

Restrict User Access

all

Limit user access to ST-PI function modules to only authorized personnel

Implement Additional Authorization Checks

all

Add custom authorization checks in affected function modules

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for all SAP users
  • Enable detailed logging and monitoring of ST-PI function module access

🔍 How to Verify

Check if Vulnerable:

Check SAP Note 3705882 for affected versions and compare with your system version using transaction SPAM

Check Version:

Use transaction SPAM or SAINT to check installed SAP components and versions

Verify Fix Applied:

Verify patch application through transaction SPAM/SAINT and test authorization checks in affected function modules

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to ST-PI function modules
  • Unusual data access patterns from authenticated users

Network Indicators:

  • Unusual data transfers from SAP systems containing sensitive information

SIEM Query:

source="sap_audit_log" AND (event_type="authorization_failure" OR module="ST-PI") AND user!="SAP*"

🔗 References

📤 Share & Export