Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SAP Addresses Critical Code Injection in CRM and S/4HANA

SAP Addresses Critical Code Injection in CRM and S/4HANA

Posted on February 10, 2026 By CWS

SAP has released its February 2026 Security Patch Day updates, highlighting crucial fixes for vulnerabilities within SAP CRM and SAP S/4HANA. These updates are designed to mitigate risks across essential business operations, with 26 new SAP Security Notes and a revision to a previously issued note.

The monthly updates serve as a comprehensive guide for addressing vulnerabilities in SAP’s software suite. Customers are strongly advised to review the Support Portal and implement these patches swiftly to safeguard their systems.

Critical Vulnerabilities Addressed

One of the most pressing issues, CVE-2026-0488, is a code injection flaw in SAP CRM and SAP S/4HANA’s Scripting Editor. This vulnerability, which carries a CVSS score of 9.9, enables authenticated users with minimal privileges to execute arbitrary code, potentially impacting multiple systems. The fix is detailed in SAP Note 3697099.

Another significant vulnerability, CVE-2026-0509, involves a missing authorization check within SAP NetWeaver Application Server ABAP. This flaw, with a CVSS score of 9.6, allows low-privilege users to bypass critical authorization mechanisms, as outlined in SAP Note 3674774.

High-Severity Concerns

The updates also address high-severity issues like CVE-2026-23687, an XML Signature Wrapping vulnerability in SAP NetWeaver AS ABAP, which poses a risk to XML-based transaction integrity. Additionally, CVE-2026-23689 affects SAP Supply Chain Management through uncontrolled resource consumption, potentially leading to service disruptions.

SAP’s bulletin emphasizes the importance of addressing availability issues, particularly in systems exposed to public networks or user-facing interfaces. Such vulnerabilities can lead to denial of service attacks if not promptly patched.

Broader Impact and Recommendations

SAP BusinessObjects BI Platform and related components are flagged for multiple vulnerabilities, including denial-of-service and cross-site scripting (XSS) issues. These endpoints require careful assessment to prevent exploitation.

SAP continues to update its security measures to protect against evolving threats. Users are encouraged to apply these patches immediately and regularly monitor SAP’s communication channels for further updates. Maintaining a secure SAP environment is vital for operational continuity and data protection.

Stay informed about cybersecurity developments by following SAP’s updates on Google News, LinkedIn, and X. For further inquiries or to share your stories, contact us through our communication channels.

Cyber Security News Tags:Authorization, BusinessObjects, code injection, CRM, Cybersecurity, denial of service, information disclosure, NetWeaver, resource consumption, S/4HANA, SAP, security patch, Vulnerabilities, XML Signature

Post navigation

Previous Post: Google’s $32B Wiz Acquisition Gets EU Nod
Next Post: North Korean Operatives Exploit LinkedIn to Access Companies

Related Posts

Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Cyber Security News
Lazarus APT Group New ScoringMathTea RAT Enables Remote Command Execution Among Other Capabilities Lazarus APT Group New ScoringMathTea RAT Enables Remote Command Execution Among Other Capabilities Cyber Security News
Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild Cyber Security News
4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign 4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign Cyber Security News
Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years Cyber Security News
FortiOS, FortiWeb, and FortiProxy Vulnerability Lets Attackers Bypass FortiCloud SSO Authentication FortiOS, FortiWeb, and FortiProxy Vulnerability Lets Attackers Bypass FortiCloud SSO Authentication Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch
  • Data Breach at Conduent Exposes Volvo Group Employees
  • Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed
  • Microsoft’s Critical Windows 11 Updates Enhance Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch
  • Data Breach at Conduent Exposes Volvo Group Employees
  • Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed
  • Microsoft’s Critical Windows 11 Updates Enhance Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark