Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 10 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap
Sap supply Chain Management |
|
| Vendors & Products |
Sap
Sap supply Chain Management |
Tue, 10 Mar 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control parameter. This triggers prolonged loop execution that consumes excessive system resources, potentially rendering the system unavailable. Successful exploitation results in a denial-of-service condition that impacts availability, while confidentiality and integrity remain unaffected. | |
| Title | Denial of service (DOS) in SAP Supply Chain Management | |
| Weaknesses | CWE-606 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2026-03-10T16:52:30.031Z
Reserved: 2026-02-23T17:50:17.028Z
Link: CVE-2026-27689
Updated: 2026-03-10T15:35:54.216Z
Status : Awaiting Analysis
Published: 2026-03-10T17:38:11.683
Modified: 2026-03-11T13:53:47.157
Link: CVE-2026-27689
No data.
OpenCVE Enrichment
Updated: 2026-04-16T10:00:14Z