SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. As a result, it has a high impact on the availability but no impact on the confidentiality and integrity.
History

Tue, 10 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap businessobjects Bi Platform
Vendors & Products Sap
Sap businessobjects Bi Platform

Tue, 10 Feb 2026 03:45:00 +0000

Type Values Removed Values Added
Description SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. As a result, it has a high impact on the availability but no impact on the confidentiality and integrity.
Title Denial of service (DOS) in SAP BusinessObjects BI Platform
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published: 2026-02-10T03:01:20.134Z

Updated: 2026-02-10T16:34:13.825Z

Reserved: 2025-12-09T22:06:33.611Z

Link: CVE-2026-0490

cve-icon Vulnrichment

Updated: 2026-02-10T16:34:09.559Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-10T04:16:01.873

Modified: 2026-02-10T15:22:54.740

Link: CVE-2026-0490

cve-icon Redhat

No data.