{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T21:30:24.785","vulnerabilities":[{"cve":{"id":"CVE-2026-23681","sourceIdentifier":"cna@sap.com","published":"2026-02-10T04:16:02.520","lastModified":"2026-02-17T16:04:47.287","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Due to missing authorization check in a function module in SAP Support Tools Plug-In, an authenticated attacker could invoke specific function modules to retrieve information about the system and its configuration. This disclosure of the system information could assist the attacker to plan subsequent attacks. This vulnerability has a low impact on the confidentiality of the application, with no effect on its integrity or availability."},{"lang":"es","value":"Debido a la falta de verificación de autorización en un módulo de función en el Plug-In de Herramientas de Soporte de SAP, un atacante autenticado podría invocar módulos de función específicos para recuperar información sobre el sistema y su configuración. Esta divulgación de la información del sistema podría ayudar al atacante a planificar ataques subsiguientes. Esta vulnerabilidad tiene un bajo impacto en la confidencialidad de la aplicación, sin efecto en su integridad o disponibilidad."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"cna@sap.com","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:solution_tools_plug-in:740:*:*:*:*:*:*:*","matchCriteriaId":"3E087FCF-62FE-48A7-80B1-1BEDEA5716D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:solution_tools_plug-in:758:*:*:*:*:*:*:*","matchCriteriaId":"F9C9CBFC-453A-4B9E-87B6-466369CE6AD6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:solution_tools_plug-in:2008_1_700:*:*:*:*:*:*:*","matchCriteriaId":"2DC728B3-F77B-45E8-B7EC-9C78B41FA1E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:solution_tools_plug-in:2008_1_710:*:*:*:*:*:*:*","matchCriteriaId":"4836C482-5A64-4373-BCB4-0185BDF83EAD"}]}]}],"references":[{"url":"https://me.sap.com/notes/3680416","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com","tags":["Vendor Advisory"]}]}}]}