Skip to main content

Missing Authorization


Severity Medium
Score 6.5/10


SAP S/4 HANA Map Treasury Correspondence Format Data¬†does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. This could allow an attacker to delete the data with a high impact to availability.

  • LOW
  • NONE
  • NONE
  • LOW
  • NONE
  • HIGH

CWE-862 - Missing Authorization

The missing authorization vulnerability occurs when a software program allows users to access privileged parts of the program without verifying the user credentials. Impact of such a vulnerability depends on the resources employed by the software, ranging from account takeover to sensitive information exposure, denial of service, and complete system takeover.


Advisory Timeline

  • Published