{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T22:44:51.196","vulnerabilities":[{"cve":{"id":"CVE-2026-0486","sourceIdentifier":"cna@sap.com","published":"2026-02-10T04:16:01.550","lastModified":"2026-02-17T16:11:29.140","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In ABAP based SAP systems a remote enabled function module does not perform necessary authorization checks for an authenticated user resulting in disclosure of system information.This has low impact on confidentiality. Integrity and availability are not impacted."},{"lang":"es","value":"En sistemas SAP basados en ABAP, un módulo de función habilitado remotamente no realiza las comprobaciones de autorización necesarias para un usuario autenticado, resultando en la divulgación de información del sistema. Esto tiene bajo impacto en la confidencialidad. La integridad y la disponibilidad no se ven impactadas."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","baseScore":5.0,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"cna@sap.com","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:solution_tools_plug-in:740:*:*:*:*:*:*:*","matchCriteriaId":"3E087FCF-62FE-48A7-80B1-1BEDEA5716D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:solution_tools_plug-in:758:*:*:*:*:*:*:*","matchCriteriaId":"F9C9CBFC-453A-4B9E-87B6-466369CE6AD6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:solution_tools_plug-in:2005_1_700:*:*:*:*:*:*:*","matchCriteriaId":"9DB77DE3-2703-4A42-BE41-D37F312A7A9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:solution_tools_plug-in:2008_1_710:*:*:*:*:*:*:*","matchCriteriaId":"4836C482-5A64-4373-BCB4-0185BDF83EAD"}]}]}],"references":[{"url":"https://me.sap.com/notes/3691645","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com","tags":["Vendor Advisory"]}]}}]}