CVE-2026-24327

4.3 MEDIUM

📋 TL;DR

This vulnerability in SAP Strategic Enterprise Management allows authenticated users to bypass authorization checks and view unauthorized information through the Balanced Scorecard in Business Server Pages. It affects organizations using vulnerable SAP SEM configurations, with low confidentiality impact and no integrity or availability effects.

💻 Affected Systems

Products:
  • SAP Strategic Enterprise Management (SEM)
Versions: Specific versions not provided in CVE; consult SAP Note 3680390 for affected versions
Operating Systems: Any OS running SAP SEM
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Balanced Scorecard functionality in Business Server Pages (BSP) components of SAP SEM

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attackers could access sensitive business intelligence data, strategic planning information, or confidential scorecard metrics they shouldn't have permission to view.

🟠

Likely Case

Internal users with legitimate access to some SEM functions could inadvertently or intentionally access additional scorecard data beyond their authorized scope.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential minor data exposure that should be caught by security monitoring.

🌐 Internet-Facing: LOW - This requires authenticated access to SAP SEM, which is typically internal-facing enterprise software.
🏢 Internal Only: MEDIUM - Internal authenticated users could exploit this to access unauthorized business intelligence data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to SAP SEM; exploitation likely involves navigating to unauthorized BSP pages or functions

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See SAP Note 3680390 for specific patch information

Vendor Advisory: https://me.sap.com/notes/3680390

Restart Required: Yes

Instructions:

1. Review SAP Note 3680390 for patch details. 2. Apply the SAP Security Patch from SAP Security Patch Day. 3. Restart affected SAP SEM services. 4. Verify authorization checks are functioning correctly.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Restrict access to Balanced Scorecard BSP applications to only authorized users

Enhanced Monitoring

all

Implement additional logging and monitoring for access to SEM Balanced Scorecard functions

🧯 If You Can't Patch

  • Implement strict role-based access controls (RBAC) to limit SEM access to minimum necessary users
  • Enable detailed audit logging for all SEM Balanced Scorecard access and regularly review for unauthorized access patterns

🔍 How to Verify

Check if Vulnerable:

Check if your SAP SEM version is listed in SAP Note 3680390 as affected

Check Version:

Use SAP transaction code SM51 or check system information in SAP GUI

Verify Fix Applied:

After patching, test that authenticated users can no longer access unauthorized Balanced Scorecard data beyond their permissions

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to SEM Balanced Scorecard BSP applications
  • Users accessing BSP pages/functions outside their normal role patterns

Network Indicators:

  • HTTP requests to SEM BSP applications with parameters indicating unauthorized data access

SIEM Query:

source="sap*" AND (app="SEM" OR component="BSP") AND (event="authorization_failure" OR event="unauthorized_access")

🔗 References

📤 Share & Export