Advisory
On 10.03.2026 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP GUI / Frontend.
SAP Note 3699761 addresses "3699761 - [CVE-2026-24317] DLL Hijacking vulnerability in SAP GUI for Windows with active GuiXT" to prevent code injection with a medium risk for exploitation.
A workaround does exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
SAP GUI for Windows allows an unauthenticated attacker to perform DLL hijacking by persuading a victim user to place a malicious DLL in a directory from which the application loads DLL files, potentially resulting in the execution of arbitrary code in the victim's user context when GuiXT is enabled.
Solution
SAP GUI for Windows no longer loads the affected DLL files. Circumstances exist that prevent the timely installation of a patch provided by the manufacturer. In such cases, you may consider applying the suggested workaround as a temporary or compensating mitigation: "Disable GuiXT for SAP GUI for Windows to prevent exploitation of this vulnerability.".
