T 5.128 Unauthorised data access by transferring code to an SAP system

If an attacker is able to insert ABAP code into an SAP system, data accesses without authorisation are possible, since the security of an SAP system must be implemented using the ABAP code.

Examples: