Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-24320
PUBLISHED
More InfoOfficial Page
Assigner-sap
Assigner Org ID-e4686d1a-f260-4930-ac4c-2f5c992778dd
View Known Exploited Vulnerability (KEV) details
Published At-10 Feb, 2026 | 03:03
Updated At-10 Feb, 2026 | 16:25
Rejected At-
▼CVE Numbering Authority (CNA)
Memory Corruption vulnerability in SAP NetWeaver and ABAP Platform (Application Server ABAP)

Due to improper memory management in SAP NetWeaver and ABAP Platform (Application Server ABAP), an authenticated attacker could exploit logical errors in memory management by supplying specially crafted input containing unique characters, which are improperly converted. This may result in memory corruption and the potential leakage of memory content. Successful exploitation of this vulnerability would have a low impact on the confidentiality of the application, with no effect on its integrity or availability.

Affected Products
Vendor
SAP SESAP_SE
Product
SAP NetWeaver and ABAP Platform (Application Server ABAP)
Default Status
unaffected
Versions
Affected
  • KRNL64NUC 7.22
  • 7.22EXT
  • KRNL64UC 7.22
  • 7.53
  • 8.04
  • KERNEL 7.22
  • 7.54
  • 7.77
  • 7.89
  • 7.93
  • 9.16
  • 9.17
  • 9.18
Problem Types
TypeCWE IDDescription
CWECWE-113CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers
Type: CWE
CWE ID: CWE-113
Description: CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers
Metrics
VersionBase scoreBase severityVector
3.13.1LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 3.1
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://me.sap.com/notes/3678313
N/A
https://url.sap/sapsecuritypatchday
N/A
Hyperlink: https://me.sap.com/notes/3678313
Resource: N/A
Hyperlink: https://url.sap/sapsecuritypatchday
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found