Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-0492— Privilege escalation vulnerability in SAP HANA database

CVSS 8.8 · High EPSS 0.06% · P18
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-0492

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Privilege escalation vulnerability in SAP HANA database
Source: NVD (National Vulnerability Database)
Vulnerability Description
SAP HANA database is vulnerable to privilege escalation allowing an attacker with valid credentials of any user to switch to another user potentially gaining administrative access. This exploit could result in a total compromise of the system�s confidentiality, integrity, and availability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键功能的认证机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
SAP HANA 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SAP HANA是德国思爱普(SAP)公司的一套高性能的实时数据分析平台。该平台提供数据查询功能,支持用户对查询实时业务数据进行查询和分析。 SAP HANA存在访问控制错误漏洞,该漏洞源于权限提升,可能导致攻击者切换用户并获取管理员访问权限,造成系统完全被破解。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SAP_SESAP HANA database HDB 2.00 -

II. Public POCs for CVE-2026-0492

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-0492

登录查看更多情报信息。

Same Patch Batch · SAP_SE · 2026-01-13 · 19 CVEs total

CVE-2026-05019.9 CRITICALSQL Injection Vulnerability in SAP S/4HANA Private Cloud and On-Premise (Financials � Gene
CVE-2026-05009.6 CRITICALRemote code execution in SAP Wily Introscope Enterprise Manager (WorkStation)
CVE-2026-04919.1 CRITICALCode Injection vulnerability in SAP Landscape Transformation
CVE-2026-04989.1 CRITICALCode Injection vulnerability in SAP S/4HANA (Private Cloud and On-Premise)
CVE-2026-05078.4 HIGHOS Command Injection vulnerability in SAP Application Server for ABAP and SAP NetWeaver RF
CVE-2026-05118.1 HIGHMultiple vulnerabilities in SAP Fiori App (Intercompany Balance Reconciliation)
CVE-2026-05068.1 HIGHMissing Authorization check in SAP NetWeaver Application Server ABAP and ABAP Platform
CVE-2026-04966.6 MEDIUMMultiple vulnerabilities in SAP Fiori App (Intercompany Balance Reconciliation)
CVE-2026-05036.4 MEDIUMMissing Authorization check in in SAP ERP Central Component and SAP S/4HANA (SAP EHS Manag
CVE-2026-05146.1 MEDIUMCross-Site Scripting (XSS) vulnerability in SAP Business Connector
CVE-2026-04996.1 MEDIUMCross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal
CVE-2026-04955.1 MEDIUMMultiple vulnerabilities in SAP Fiori App (Intercompany Balance Reconciliation)
CVE-2026-05134.7 MEDIUMOpen Redirect Vulnerability in SAP Supplier Relationship Management (SICF Handler in SRM C
CVE-2026-04974.3 MEDIUMMissing Authorization check in Business Server Pages Application (Product Designer Web UI)
CVE-2026-04944.3 MEDIUMInformation Disclosure vulnerability in SAP Fiori App (Intercompany Balance Reconciliation
CVE-2026-04934.3 MEDIUMCross-Site Request Forgery (CSRF) vulnerability in SAP Fiori App (Intercompany Balance Rec
CVE-2026-05043.8 LOWInsufficient Input Handling in JNDI Operations of SAP Identity Management
CVE-2026-05103.0 LOWObsolete Encryption Algorithm Used in NW AS Java UME User Mapping

IV. Related Vulnerabilities

V. Comments for CVE-2026-0492

No comments yet


Leave a comment