{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T08:35:16.102","vulnerabilities":[{"cve":{"id":"CVE-2026-24320","sourceIdentifier":"cna@sap.com","published":"2026-02-10T04:16:03.990","lastModified":"2026-02-17T15:27:30.400","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Due to improper memory management in SAP NetWeaver and ABAP Platform (Application Server ABAP), an authenticated attacker could exploit logical errors in memory management by supplying specially crafted input containing unique characters, which are improperly converted. This may result in memory corruption and the potential leakage of memory content. Successful exploitation of this vulnerability would have a low impact on the confidentiality of the application, with no effect on its integrity or availability."},{"lang":"es","value":"Debido a una gestión de memoria inadecuada en SAP NetWeaver y ABAP Platform (Servidor de Aplicaciones ABAP), un atacante autenticado podría explotar errores lógicos en la gestión de memoria al proporcionar una entrada especialmente diseñada que contiene caracteres únicos, los cuales se convierten de forma incorrecta. Esto podría resultar en corrupción de memoria y la posible fuga de contenido de la memoria. La explotación exitosa de esta vulnerabilidad tendría un bajo impacto en la confidencialidad de la aplicación, sin efecto en su integridad o disponibilidad."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":1.4}]},"weaknesses":[{"source":"cna@sap.com","type":"Primary","description":[{"lang":"en","value":"CWE-113"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_as_abap_kernel:7.22:*:*:*:*:*:*:*","matchCriteriaId":"FE603A80-8FF0-4180-9E11-C468AE2441C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_as_abap_kernel:7.54:*:*:*:*:*:*:*","matchCriteriaId":"7F5D31D3-B2B2-4347-B8DF-D06056289598"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_as_abap_kernel:7.77:*:*:*:*:*:*:*","matchCriteriaId":"50570852-982E-40CA-B391-3FB8B9373F78"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_as_abap_kernel:7.89:*:*:*:*:*:*:*","matchCriteriaId":"B8B74AD9-A83E-45DD-96C2-4F3C8C8C6AE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_as_abap_kernel:7.93:*:*:*:*:*:*:*","matchCriteriaId":"237DBA4A-B5A9-48C9-B6A3-D293BB66EF69"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_as_abap_kernel:9.16:*:*:*:*:*:*:*","matchCriteriaId":"3668B2D9-0A4C-43F5-B248-9A6438AF7D71"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_as_abap_kernel:9.17:*:*:*:*:*:*:*","matchCriteriaId":"FB41121A-3D27-460C-A9AF-A1573F1F4568"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_as_abap_kernel:9.18:*:*:*:*:*:*:*","matchCriteriaId":"1BC9779B-7571-44F7-BCCC-6BF2834ED779"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_as_abap_krnl64nuc:7.22:*:*:*:*:*:*:*","matchCriteriaId":"02507EB2-8776-4EA9-9164-B2F6AD911B59"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_as_abap_krnl64nuc:7.22ext:*:*:*:*:*:*:*","matchCriteriaId":"7867ADA5-47AA-48DD-9CAC-D3ACB5713CB3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_as_abap_krnl64uc:7.22:*:*:*:*:*:*:*","matchCriteriaId":"B5E3292A-7311-4821-A52E-8FB4A1449D44"}]}]}],"references":[{"url":"https://me.sap.com/notes/3678313","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com","tags":["Vendor Advisory"]}]}}]}