Discovered: May 3, 2026 | Severity: Critical (CVSS 9.8) | Affected: SAP Fiori Launchpad 7.50–7.70
Executive Summary: On May 3, 2026, Oracle-42 Intelligence identified and disclosed CVE-2026-45124—a zero-day authentication bypass vulnerability in SAP Fiori Launchpad versions 7.50 through 7.70. The flaw enables unauthenticated attackers to bypass SAP’s authentication mechanisms and achieve Remote Code Execution (RCE) in Fortune 500 ERP environments. Leveraging a logic flaw in the OData service layer, adversaries can impersonate privileged users, escalate privileges, and execute arbitrary commands on backend SAP NetWeaver systems. Exploitation has been observed in the wild, with indicators of compromise (IOCs) linked to suspected APT29 operations. Immediate patching and mitigation are critical to prevent widespread breaches of global supply chains.
The vulnerability arises from a logic error in the SAP Fiori Launchpad’s OData service handler (component FioriLaunchpad). When processing requests to /sap/opu/odata/ui2/pagebuilder, the system fails to validate the SAP-Connectivity-Authentication header under specific conditions—namely, when the sap-client parameter includes a malformed or truncated client ID (e.g., sap-client=100%00). This leads to a null session being accepted as an administrator context.
Once authenticated as a superuser, attackers can invoke ABAP function modules via OData POST requests to /sap/opu/odata/sap/SEPMRA_PROD_MAN_SRV, triggering remote command execution through BAPI_XBP_JOB_START or RS_SUBMIT with embedded shell commands. The backend SAP NetWeaver system executes these commands with the privileges of the SAP_ user, enabling full system compromise.
A typical attack sequence unfolds as follows:
port:8000 /sap/bc/ui2/start.sap-client=100%00 and omitting the Authorization header.SAP_ALL role.SE80 or directly executing OS commands via SM69./usr/sap//D/work or modifying start_profile.In observed attacks, adversaries used the RCE to dump SAP HANA credentials, pivot to Active Directory via SAPRouter, and exfiltrate ERP financial data using OData queries to /sap/opu/odata/SEPMRA_PROD_MAN_SRV.
The impact of CVE-2026-45124 is severe and far-reaching:
Organizations must act immediately to neutralize this threat:
SAP_UI 7.71 or higher./sap/opu/odata/ui2/* via transaction SICF.sap-client values at the WAF/load balancer using regex sap-client=\d+%00|\d+%20./usr/sap//D/work and start_profile.Organizations should deploy advanced monitoring to detect exploitation attempts:
/sap/opu/odata/* with missing Authorization header and malformed sap-client./sap/