{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-27686","assignerOrgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","state":"PUBLISHED","assignerShortName":"sap","dateReserved":"2026-02-23T17:50:17.028Z","datePublished":"2026-03-10T00:18:33.189Z","dateUpdated":"2026-03-10T16:52:48.429Z"},"containers":{"cna":{"providerMetadata":{"orgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","shortName":"sap","dateUpdated":"2026-03-10T00:18:33.189Z"},"title":"Missing Authorization check in SAP Business Warehouse (Service API)","problemTypes":[{"descriptions":[{"lang":"eng","cweId":"CWE-862","description":"CWE-862: Missing Authorization","type":"CWE"}]}],"affected":[{"vendor":"SAP_SE","product":"SAP Business Warehouse (Service API)","versions":[{"status":"affected","version":"DW4CORE 200"},{"status":"affected","version":"300"},{"status":"affected","version":"400"},{"status":"affected","version":"PI_BASIS 2006_1_700"},{"status":"affected","version":"701"},{"status":"affected","version":"702"},{"status":"affected","version":"730"},{"status":"affected","version":"731"},{"status":"affected","version":"740"},{"status":"affected","version":"SAP_BW 750"},{"status":"affected","version":"751"},{"status":"affected","version":"752"},{"status":"affected","version":"753"},{"status":"affected","version":"754"},{"status":"affected","version":"755"},{"status":"affected","version":"756"},{"status":"affected","version":"757"},{"status":"affected","version":"758"},{"status":"affected","version":"816"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Due to a Missing Authorization Check in SAP Business Warehouse (Service API), an authenticated attacker could perform unauthorized actions via an affected RFC function module. Successful exploitation could enable unauthorized configuration and control changes, potentially disrupting request processing and causing denial of service. This results in low impact on integrity and high impact on availability, while confidentiality remains unaffected.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Due to a Missing Authorization Check in SAP Business Warehouse (Service API), an authenticated attacker could perform unauthorized actions via an affected RFC function module. Successful exploitation could enable unauthorized configuration and control changes, potentially disrupting request processing and causing denial of service. This results in low impact on integrity and high impact on availability, while confidentiality remains unaffected.</p>"}]}],"references":[{"url":"https://me.sap.com/notes/3703385"},{"url":"https://url.sap/sapsecuritypatchday"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH","baseSeverity":"MEDIUM","baseScore":5.9,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-10T15:35:59.612402Z","id":"CVE-2026-27686","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-10T16:52:48.429Z"}}]}}