CVE-2026-27675
Description
SAP Landscape Transformation contains a vulnerability in an RFC-exposed function module that could allow a high privileged adversary to inject arbitrary ABAP code and operating system commands. Due to this, some information could be modified, but the attacker does not have control over kind or degree. This leads to a low impact on integrity, while confidentiality and availability are not impacted.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A high-privileged attacker can exploit an RFC function module in SAP Landscape Transformation to inject arbitrary ABAP code and OS commands with low integrity impact.
Vulnerability
Details
CVE-2026-27675 exists in an RFC-exposed function module within SAP Landscape Transformation [1]. The root cause is insufficient sanitization of input passed to the module, enabling a high-privileged adversary to inject arbitrary ABAP code and operating system commands. The official description notes that the attacker lacks control over the kind or degree of modification, limiting the exploit's flexibility [1].
Attack
Path
To exploit the vulnerability, an attacker must already possess high privileges within the SAP system and have network access to the RFC interface. The attack requires no user interaction, but the prerequisite of high privileges significantly reduces the likelihood of exploitation in well-configured environments. The CVSS v3 score of 2.0 reflects these constraints.
Impact
Successful exploitation allows the attacker to alter certain information within the SAP system, impacting integrity. However, confidentiality and availability remain unaffected. The low integrity impact (as defined by CVSS 2.0/3.0) means only limited data can be modified, and the attacker cannot precisely determine what changes occur [1].
Mitigation
SAP recommends applying the security patch delivered through the regular SAP Security Patch Day process, specifically the correction referenced in SAP Security Notes [1]. Administrators should review and apply the note for SAP Landscape Transformation to close the vulnerability. No workarounds are documented; patching is the primary remediation.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.