CVE-2026-27685
Published: 10 March 2026
Summary
CVE-2026-27685 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Sap (inferred from references). Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 19.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the deserialization vulnerability (CWE-502) by requiring timely remediation through application of SAP patches as specified in Note 3714585.
Validates and sanitizes uploaded content in the Enterprise Portal Administration interface to block malicious deserialization payloads.
Limits privileged user access (PR:H requirement) to the vulnerable administration interface, reducing the attack surface for exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Deserialization of attacker-controlled content uploaded via the privileged admin interface (AV:N, PR:H) directly enables RCE and scope change to full host compromise, mapping to exploitation of a network-accessible application (T1190) for privilege escalation (T1068).
NVD Description
SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged user uploads untrusted or malicious content that, upon deserialization, could result in a high impact on the confidentiality, integrity, and availability of the host system.
Deeper analysisAI
SAP NetWeaver Enterprise Portal Administration contains a deserialization vulnerability (CWE-502) that affects systems where a privileged user can upload untrusted or malicious content. Upon deserialization of this content, an attacker could achieve a high impact on the confidentiality, integrity, and availability of the host system. The vulnerability, tracked as CVE-2026-27685, was published on 2026-03-10 and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H), indicating critical severity.
Exploitation requires an attacker to possess privileged user access (PR:H) to the Enterprise Portal Administration interface over the network (AV:N). By uploading specially crafted malicious content, the attacker can trigger unsafe deserialization, leading to scope expansion (S:C) and full compromise of the host system, including high-impact unauthorized disclosure, modification, and disruption of data and services.
SAP advisories provide mitigation details in Note 3714585 (https://me.sap.com/notes/3714585) and as part of the SAP Security Patch Day (https://url.sap/sapsecuritypatchday), recommending application of available patches to address the deserialization flaw and prevent privileged user exploitation.
Details
- CWE(s)