Due to a Deserialization vulnerability in SAP NetWeaver (JMS service), an attacker authenticated as an administrator with local access could submit specially crafted content to the server. If processed by the application, this content could trigger unintended behavior during internal logic execution, potentially causing a denial of service. Successful exploitation results in a high impact on availability, while confidentiality and integrity remain unaffected.
References
| Link | Resource |
|---|---|
| https://me.sap.com/notes/3687285 | Permissions Required |
| https://url.sap/sapsecuritypatchday | Vendor Advisory |
Configurations
History
17 Feb 2026, 16:04
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:sap:netweaver:7.50:*:*:*:java_as:*:*:* | |
| References | () https://me.sap.com/notes/3687285 - Permissions Required | |
| References | () https://url.sap/sapsecuritypatchday - Vendor Advisory | |
| First Time |
Sap netweaver
Sap |
10 Feb 2026, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-10 04:16
Updated : 2026-02-17 16:04
NVD link : CVE-2026-23685
Mitre link : CVE-2026-23685
CVE.ORG link : CVE-2026-23685
JSON object : View
Products Affected
sap
- netweaver
CWE
CWE-502
Deserialization of Untrusted Data
