{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T14:04:20.002","vulnerabilities":[{"cve":{"id":"CVE-2026-0492","sourceIdentifier":"cna@sap.com","published":"2026-01-13T02:15:51.243","lastModified":"2026-01-27T20:18:16.730","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"SAP HANA database is vulnerable to privilege escalation allowing an attacker with valid credentials of any user to switch to another user potentially gaining administrative access. This exploit could result in a total compromise of the system�s confidentiality, integrity, and availability."},{"lang":"es","value":"La base de datos SAP HANA es vulnerable a la escalada de privilegios, permitiendo a un atacante con credenciales válidas de cualquier usuario cambiar a otro usuario, potencialmente obteniendo acceso administrativo. Este exploit podría resultar en un compromiso total de la confidencialidad, integridad y disponibilidad del sistema."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"cna@sap.com","type":"Primary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:hana_database:2.00:*:*:*:*:*:*:*","matchCriteriaId":"4C6CA542-7071-48B6-B135-3AE9B4BB1DC5"}]}]}],"references":[{"url":"https://me.sap.com/notes/3691059","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com","tags":["Patch"]}]}}]}