{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Material Master Application versions S4CORE 102, 103, 104, 105, 106, 107, 108, 109, SCM_BASIS 700, SCM_BASIS 701, SCM_BASIS 702, SCM_BASIS 712, SCM_BASIS 713 et SCM_BASIS 714 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"S4CORE (Manage Journal Entries) versions S4CORE 104, 105, 106, 107 et 108 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"NetWeaver Application Server Java (Web Dynpro Java) version WD-RUNTIME 7.50 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"ERP and S/4 HANA (Private Cloud and On-Premise) versions SAP_FIN 618, 720, 730, EA-FIN 617, 700, SAPSCORE 135, S4CORE 102, 103, 104, 105, 106, 107, 108, 109, EA-APPL 600, 602, 603, 604, 605 et 606 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"S/4HANA OData Service (Manage Reference Equipment) version S4CORE 109 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"Landscape Transformation versions DMIS 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020, S4CORE 102, 103, 104, 105, 106, 107, 108 et 109 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"NetWeaver Application Server ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"S/4HANA Backend OData Service (Manage Reference Structures) version S4CORE 109 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"S/4HANA Frontend OData Service (Manage Reference Structures) version UIS4H 109 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"S/4HANA OData Service (Manage Technical Object Structures) version S4CORE 109 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"Business Planning and Consolidation and Business Warehouse versions HANABPC 810, BPC4HANA 300, SAP_BW 750, 752, 753, 754, 755, 756, 757, 758 et 816 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"HANA Cockpit and HANA Database Explorer version SAP_HANA_COCKPIT 2.0 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"S/4HANA (Private Cloud and On-Premise) versions S4CORE 105, 106, 107, 108, 109, FI-CA 606, 616, 617 et 618 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"BusinessObjects Business Intelligence Platform versions ENTERPRISE 430, 2025 et 2027 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"NetWeaver Application Server ABAP versions SAP_UI 758 et 816 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"Human Capital Management for S/4HANA versions S4HCMRXX 100, 101, 102, SAP_HRRXX 600, 604 et 608 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"Business Analytics and Content Management versions S4HCMRXX 100, 101, 102, SAP_HRRXX 600, 604 et 608 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"Supplier Relationship Management (SICF Handler in SRM Catalog) versions SRM_SERVER 702, 713 et 714 sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2026-27683","url":"https://www.cve.org/CVERecord?id=CVE-2026-27683"},{"name":"CVE-2026-27679","url":"https://www.cve.org/CVERecord?id=CVE-2026-27679"},{"name":"CVE-2026-34262","url":"https://www.cve.org/CVERecord?id=CVE-2026-34262"},{"name":"CVE-2026-34264","url":"https://www.cve.org/CVERecord?id=CVE-2026-34264"},{"name":"CVE-2026-34257","url":"https://www.cve.org/CVERecord?id=CVE-2026-34257"},{"name":"CVE-2025-42899","url":"https://www.cve.org/CVERecord?id=CVE-2025-42899"},{"name":"CVE-2026-34261","url":"https://www.cve.org/CVERecord?id=CVE-2026-34261"},{"name":"CVE-2026-34256","url":"https://www.cve.org/CVERecord?id=CVE-2026-34256"},{"name":"CVE-2026-27680","url":"https://www.cve.org/CVERecord?id=CVE-2026-27680"},{"name":"CVE-2026-27677","url":"https://www.cve.org/CVERecord?id=CVE-2026-27677"},{"name":"CVE-2026-27675","url":"https://www.cve.org/CVERecord?id=CVE-2026-27675"},{"name":"CVE-2026-24318","url":"https://www.cve.org/CVERecord?id=CVE-2026-24318"},{"name":"CVE-2026-0512","url":"https://www.cve.org/CVERecord?id=CVE-2026-0512"},{"name":"CVE-2026-27676","url":"https://www.cve.org/CVERecord?id=CVE-2026-27676"},{"name":"CVE-2026-27672","url":"https://www.cve.org/CVERecord?id=CVE-2026-27672"},{"name":"CVE-2025-64775","url":"https://www.cve.org/CVERecord?id=CVE-2025-64775"},{"name":"CVE-2026-27674","url":"https://www.cve.org/CVERecord?id=CVE-2026-27674"},{"name":"CVE-2026-27678","url":"https://www.cve.org/CVERecord?id=CVE-2026-27678"},{"name":"CVE-2026-27673","url":"https://www.cve.org/CVERecord?id=CVE-2026-27673"},{"name":"CVE-2026-27681","url":"https://www.cve.org/CVERecord?id=CVE-2026-27681"}],"links":[],"reference":"CERTFR-2026-AVI-0434","revisions":[{"description":"Version initiale","revision_date":"2026-04-14T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Injection SQL (SQLi)"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP","vendor_advisories":[{"published_at":"2026-04-14","title":"Bulletin de s\u00e9curit\u00e9 SAP april-2026","url":"https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2026.html"}]}
