CVE-2026-24324

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users with standard privileges in SAP BusinessObjects Business Intelligence Platform to execute a specific query in AdminTools that crashes the Content Management Server (CMS), causing denial of service. The attack impacts system availability while leaving confidentiality and integrity unaffected. Organizations running vulnerable versions of SAP BusinessObjects are affected.

💻 Affected Systems

Products:
  • SAP BusinessObjects Business Intelligence Platform
Versions: Specific versions not provided in CVE description; consult SAP Note 3695912 for exact affected versions
Operating Systems: All supported OS platforms for SAP BusinessObjects
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to AdminTools; default configurations with standard user privileges are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete CMS unavailability, disrupting all BusinessObjects BI services dependent on CMS functionality, potentially affecting business operations and reporting.

🟠

Likely Case

Partial or complete CMS service disruption requiring restart or recovery procedures, impacting BI report generation and data access.

🟢

If Mitigated

Minimal impact with proper access controls, monitoring, and rapid incident response to detect and contain exploitation attempts.

🌐 Internet-Facing: MEDIUM - While authentication is required, internet-facing instances could be targeted by attackers who obtain valid credentials through other means.
🏢 Internal Only: HIGH - Internal users with standard privileges could intentionally or accidentally trigger the vulnerability, causing service disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but appears straightforward based on CVE description; specific query details not publicly disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to SAP Note 3695912 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3695912

Restart Required: Yes

Instructions:

1. Review SAP Note 3695912 for affected versions and patches. 2. Download appropriate security patch from SAP Support Portal. 3. Apply patch following SAP's BusinessObjects patching procedures. 4. Restart affected services including CMS.

🔧 Temporary Workarounds

Restrict AdminTools Access

all

Limit AdminTools access to only necessary administrative users instead of all authenticated users.

Configure role-based access control in SAP BusinessObjects Central Management Console to restrict AdminTools functionality

Implement Query Monitoring

all

Monitor and alert on suspicious query patterns in AdminTools that could trigger the CMS crash.

Configure SAP BusinessObjects audit logging and SIEM integration for AdminTools activity monitoring

🧯 If You Can't Patch

  • Implement strict access controls to limit AdminTools functionality to essential administrative personnel only
  • Deploy network segmentation and monitoring to detect and block exploitation attempts, with incident response procedures ready

🔍 How to Verify

Check if Vulnerable:

Check SAP BusinessObjects version against affected versions listed in SAP Note 3695912

Check Version:

Check version in SAP BusinessObjects Central Management Console or via command: java -version (for Java components)

Verify Fix Applied:

Verify patch application through SAP BusinessObjects version check and confirm CMS stability after applying the security update

📡 Detection & Monitoring

Log Indicators:

  • CMS crash logs, AdminTools query execution logs showing suspicious patterns, service restart events

Network Indicators:

  • Unusual AdminTools query traffic patterns, CMS service unavailability alerts

SIEM Query:

source="SAP_BusinessObjects" AND (event_type="service_crash" OR query="*specific_admin_query*" OR service="CMS")

🔗 References

📤 Share & Export