SAP

S/4hana

36 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 09.09.2025 02:15:39
  • Zuletzt bearbeitet 09.09.2025 16:28:43

Due to missing input validation, an attacker with high privilege access to ABAP reports could delete the content of arbitrary database tables, if the tables are not protected by an authorization group. This leads to a high impact on integrity and ava...

Medienbericht
  • EPSS 0.06%
  • Veröffentlicht 12.08.2025 02:09:53
  • Zuletzt bearbeitet 12.08.2025 14:25:33

SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerabilit...

  • EPSS 0.17%
  • Veröffentlicht 12.08.2025 02:07:16
  • Zuletzt bearbeitet 12.08.2025 14:25:33

Due to directory traversal vulnerability in SAP S/4HANA (Bank Communication Management), an attacker with high privileges and access to a specific transaction and method in Bank Communication Management could gain unauthorized access to sensitive ope...

  • EPSS 0.04%
  • Veröffentlicht 12.08.2025 02:04:50
  • Zuletzt bearbeitet 12.08.2025 14:25:33

SAP S/4HANA Supplier invoice is vulnerable to CRLF Injection. An attacker with user-level privileges can bypass the allowlist and insert untrusted sites into the 'Trusted Sites' configuration by injecting line feed (LF) characters into application in...

Medienbericht
  • EPSS 0.39%
  • Veröffentlicht 08.07.2025 00:36:23
  • Zuletzt bearbeitet 08.07.2025 16:18:14

SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with user level privileges to create a new report with his own code potentially gaining full control of the affected SAP system causin...

Medienbericht
  • EPSS 0.09%
  • Veröffentlicht 10.06.2025 00:13:15
  • Zuletzt bearbeitet 12.06.2025 16:06:39

Due to a missing authorization check vulnerability in SAP S/4HANA (Enterprise Event Enablement), an attacker with access to the Inbound Binding Configuration could create an RFC destination and assign an arbitrary high-privilege user. This allows the...

Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 10.06.2025 00:11:45
  • Zuletzt bearbeitet 12.06.2025 16:06:39

SAP Manage Processing Rules (For Bank Statement) allows an attacker with basic privileges to edit shared rules of any user by tampering the request parameter. Due to missing authorization check, the attacker can edit rules that should be restricted, ...

Medienbericht
  • EPSS 0.05%
  • Veröffentlicht 10.06.2025 00:11:29
  • Zuletzt bearbeitet 12.06.2025 16:06:39

SAP S/4HANA Manage Central Purchase Contract does not perform necessary authorization checks for an authenticated user. Due to this, an attacker could execute the function import on the entity making it inaccessible for unrestricted user. This has lo...

Medienbericht
  • EPSS 0.08%
  • Veröffentlicht 13.05.2025 00:19:51
  • Zuletzt bearbeitet 13.05.2025 19:35:18

SAP S/4HANA Cloud Private Edition or on Premise (SCM Master Data Layer (MDL)) allows an authenticated attacker with SAP standard authorization to execute a certain function module remotely and replace arbitrary ABAP programs, including SAP standard p...

Medienbericht
  • EPSS 0.08%
  • Veröffentlicht 13.05.2025 00:18:25
  • Zuletzt bearbeitet 13.05.2025 19:35:18

SAP S/4 HANA allows an authenticated attacker with user privileges to configure a field not intended for their access and create a custom UI layout displaying this field. On performing this step the attacker could gain access to highly sensitive info...