Topic starter
Description
SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. As a result, it has a high impact on the availability but no impact on the confidentiality and integrity.
ReferencesÂ
https://me.sap.com/notes/3654236
Posted : 18/02/2026 9:46 pm
