SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap Se
Sap Se sap Gui For Windows With Active Guixt |
|
| Vendors & Products |
Sap Se
Sap Se sap Gui For Windows With Active Guixt |
Tue, 10 Mar 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability. | |
| Title | DLL Hijacking vulnerability in SAP GUI for Windows with active GuiXT | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published: 2026-03-10T00:18:00.851Z
Updated: 2026-03-10T16:53:07.917Z
Reserved: 2026-01-21T22:15:25.361Z
Link: CVE-2026-24317
Updated: 2026-03-10T15:36:05.638Z
Status : Received
Published: 2026-03-10T17:35:56.040
Modified: 2026-03-10T17:35:56.040
Link: CVE-2026-24317
No data.