Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 10 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap Se
Sap Se sap Gui For Windows With Active Guixt |
|
| Vendors & Products |
Sap Se
Sap Se sap Gui For Windows With Active Guixt |
Tue, 10 Mar 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability. | |
| Title | DLL Hijacking vulnerability in SAP GUI for Windows with active GuiXT | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2026-03-11T03:56:32.610Z
Reserved: 2026-01-21T22:15:25.361Z
Link: CVE-2026-24317
Updated: 2026-03-10T15:36:05.638Z
Status : Awaiting Analysis
Published: 2026-03-10T17:35:56.040
Modified: 2026-03-11T13:53:47.157
Link: CVE-2026-24317
No data.
OpenCVE Enrichment
Updated: 2026-04-16T10:00:14Z