CVE-2026-24320

Due to improper memory management in SAP NetWeaver and ABAP Platform (Application Server ABAP), an authenticated attacker could exploit logical errors in memory management by supplying specially crafted input containing unique characters, which are improperly converted. This may result in memory corruption and the potential leakage of memory content. Successful exploitation of this vulnerability would have a low impact on the confidentiality of the application, with no effect on its integrity or availability.
References
Link Resource
https://me.sap.com/notes/3678313 Permissions Required
https://url.sap/sapsecuritypatchday Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:netweaver_as_abap_kernel:7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:7.54:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:7.77:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:7.89:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:7.93:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:9.16:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:9.17:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:9.18:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_krnl64nuc:7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_krnl64nuc:7.22ext:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_krnl64uc:7.22:*:*:*:*:*:*:*

History

17 Feb 2026, 15:27

Type Values Removed Values Added
CPE cpe:2.3:a:sap:netweaver_as_abap_krnl64nuc:7.22ext:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_krnl64uc:7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:9.16:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_krnl64nuc:7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:7.93:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:9.17:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:7.54:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:7.77:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:9.18:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_as_abap_kernel:7.89:*:*:*:*:*:*:*
References () https://me.sap.com/notes/3678313 - () https://me.sap.com/notes/3678313 - Permissions Required
References () https://url.sap/sapsecuritypatchday - () https://url.sap/sapsecuritypatchday - Vendor Advisory
Summary
  • (es) Debido a una gestión de memoria inadecuada en SAP NetWeaver y ABAP Platform (Servidor de Aplicaciones ABAP), un atacante autenticado podría explotar errores lógicos en la gestión de memoria al proporcionar una entrada especialmente diseñada que contiene caracteres únicos, los cuales se convierten de forma incorrecta. Esto podría resultar en corrupción de memoria y la posible fuga de contenido de la memoria. La explotación exitosa de esta vulnerabilidad tendría un bajo impacto en la confidencialidad de la aplicación, sin efecto en su integridad o disponibilidad.
CWE CWE-787
First Time Sap netweaver As Abap Kernel
Sap netweaver As Abap Krnl64uc
Sap
Sap netweaver As Abap Krnl64nuc

10 Feb 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-10 04:16

Updated : 2026-02-17 15:27


NVD link : CVE-2026-24320

Mitre link : CVE-2026-24320

CVE.ORG link : CVE-2026-24320


JSON object : View

Products Affected

sap

  • netweaver_as_abap_kernel
  • netweaver_as_abap_krnl64nuc
  • netweaver_as_abap_krnl64uc
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

CWE-787

Out-of-bounds Write