{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T20:55:20.259","vulnerabilities":[{"cve":{"id":"CVE-2026-24314","sourceIdentifier":"cna@sap.com","published":"2026-02-24T06:16:35.270","lastModified":"2026-03-03T00:28:43.917","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Under certain conditions SAP S/4HANA (Manage Payment Media) allows an authenticated attacker to access information which would otherwise be restricted. This could cause low impact on confidentiality of the application while integrity and availability are not impacted."},{"lang":"es","value":"Bajo ciertas condiciones, SAP S/4HANA (Gestionar Medios de Pago) permite a un atacante autenticado acceder a información que de otro modo estaría restringida. Esto podría causar un impacto bajo en la confidencialidad de la aplicación, mientras que la integridad y la disponibilidad no se ven impactadas."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"cna@sap.com","type":"Primary","description":[{"lang":"en","value":"CWE-497"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:s\\/4hana_uiapfi70:600:*:*:*:*:*:*:*","matchCriteriaId":"9AB97C06-5D56-470C-8B8F-3C782E1F70C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:s\\/4hana_uiapfi70:700:*:*:*:*:*:*:*","matchCriteriaId":"509D6CFA-7A14-428C-B878-9C9C1588ED8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:s\\/4hana_uiapfi70:800:*:*:*:*:*:*:*","matchCriteriaId":"06BDD6A0-C115-427B-876B-4F0C393043DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:s\\/4hana_uiapfi70:900:*:*:*:*:*:*:*","matchCriteriaId":"2C05B6F2-C6A8-4FEB-917A-AB2FA86B50BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:s\\/4hana_uiapfi70:901:*:*:*:*:*:*:*","matchCriteriaId":"186D3DCE-2FE0-4EB9-B9DB-EF7B5F0775E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:s\\/4hana_uiapfi70:902:*:*:*:*:*:*:*","matchCriteriaId":"64DFAF25-C968-40A5-96EA-4B163CA21897"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:s\\/4hana_uis4h:109:*:*:*:*:*:*:*","matchCriteriaId":"F1C5F869-886A-4E07-81EB-B9DD4BE08180"}]}]}],"references":[{"url":"https://me.sap.com/notes/3646297","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com","tags":["Vendor Advisory"]}]}}]}