Sap Hana Database vulnerabilities

8 known vulnerabilities affecting sap/hana_database.

Total CVEs
8
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH4MEDIUM3

Vulnerabilities

Page 1 of 1
CVE-2026-0492HIGHCVSS 8.8v2.002026-01-13
CVE-2026-0492 [HIGH] CWE-306 CVE-2026-0492: SAP HANA database is vulnerable to privilege escalation allowing an attacker with valid credentials SAP HANA database is vulnerable to privilege escalation allowing an attacker with valid credentials of any user to switch to another user potentially gaining administrative access. This exploit could result in a total compromise of the system�s confidentiality, integrity, and availability.
nvd
CVE-2023-40309CRITICALCVSS 9.8v2.02023-09-12
CVE-2023-40309 [CRITICAL] CWE-863 CVE-2023-40309: SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired, an attacker could abuse functionality restricted to a particular user group as well as r
nvd
CVE-2023-40308HIGHCVSS 7.5v2.02023-09-12
CVE-2023-40308 [HIGH] CWE-787 CVE-2023-40308: SAP CommonCryptoLib allows an unauthenticated attacker to craft a request, which when submitted to a SAP CommonCryptoLib allows an unauthenticated attacker to craft a request, which when submitted to an open port causes a memory corruption error in a library which in turn causes the target component to crash making it unavailable. There is no ability to view or modify any information.
nvd
CVE-2021-21474MEDIUMCVSS 6.5v1.00v2.002021-02-09
CVE-2021-21474 [MEDIUM] CWE-326 CVE-2021-21474: SAP HANA Database, versions - 1.0, 2.0, accepts SAML tokens with MD5 digest, an attacker who manages SAP HANA Database, versions - 1.0, 2.0, accepts SAML tokens with MD5 digest, an attacker who manages to obtain an MD5-digest signed SAML Assertion issued for an SAP HANA instance might be able to tamper with it and alter it in a way that the digest continues to be the same and without invalidating the digital signature, this allows them to impersona
nvd
CVE-2020-26834MEDIUMCVSS 5.4v2.002020-12-09
CVE-2020-26834 [MEDIUM] CWE-287 CVE-2020-26834: SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bear SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.
nvd
CVE-2019-0350HIGHCVSS 7.5v1.00v2.002019-11-04
CVE-2019-0350 [HIGH] CVE-2019-0350: SAP HANA Database, versions 1.0, 2.0, allows an unauthorized attacker to send a malformed connection SAP HANA Database, versions 1.0, 2.0, allows an unauthorized attacker to send a malformed connection request, which crashes the indexserver of an SAP HANA instance, leading to Denial of Service
nvd
CVE-2018-2424HIGHCVSS 7.5v1.00v2.002018-06-12
CVE-2018-2424 [CRITICAL] CWE-20 CVE-2018-2424: SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to maliciou SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Java) 7.30, 7.31, 7.40, 7,50; SAP UI 7.40, 7.50, 7.51, 7.52, and version 2.
nvd
CVE-2017-16687MEDIUMCVSS 5.3v1.00v2.002017-12-12
CVE-2017-16687 [MEDIUM] CWE-200 CVE-2017-16687: The user self-service tools of SAP HANA extended application services, classic user self-service, a The user self-service tools of SAP HANA extended application services, classic user self-service, a part of SAP HANA Database versions 1.00 and 2.00, can be misused to enumerate valid and invalid user accounts. An unauthenticated user could use the error messages to determine if a given username is valid.
nvd