Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SAP Security Patch Day January 2026

Posted on January 13, 2026January 13, 2026 By CWS

SAP launched 17 new safety notes on January 13, 2026, as a part of its month-to-month Safety Patch Day, addressing important injection flaws and distant code execution vulnerabilities throughout key merchandise.

No updates addressed prior notes, urging organizations to behave swiftly on the 4 HotNews-level vulnerabilities.​

4 important points dominate this patch cycle, with CVSS scores reaching 9.9, indicating extreme impacts equivalent to full-system compromise. Attackers might exploit these remotely, usually with low privileges, to control information or execute code throughout scopes.​

Essentially the most urgent situation is SQL injection in SAP S/4HANA Non-public Cloud and On-Premise Financials – Common Ledger (CVE-2026-0501), the place authenticated, low-privilege customers can inject arbitrary SQL queries, compromising the confidentiality, integrity, and availability of monetary information.

Distant code execution strikes SAP Wily Introscope Enterprise Supervisor Workstation (CVE-2026-0500), permitting unauthenticated attackers with person interplay to grab management.

Code injection flaws hit SAP S/4HANA (CVE-2026-0498) and Panorama Transformation (CVE-2026-0491), each with a CVSS rating of 9.1, letting high-privilege customers inject and run malicious code remotely.​

Notice #CVE IDProductAffected VersionsCVSS v3.1Priority3687749​CVE-2026-0501​S/4HANA (Financials – Common Ledger)​S4CORE 102-109​9.9​Important​3668679​CVE-2026-0500​Wily Introscope Enterprise Supervisor​WILY_INTRO_ENTERPRISE 10.8​9.6​Important​3694242​CVE-2026-0498​S/4HANA (Non-public Cloud/On-Premise)​S4CORE 102-109​9.1​Important​3697979​CVE-2026-0491​Panorama Transformation​DMIS 2011_1_700 to 2020​9.1​Important​

Excessive and Medium Dangers

Excessive-priority notes embrace privilege escalation in SAP HANA (CVE-2026-0492, CVSS 8.8), letting low-privilege customers achieve full database management, and OS command injection in ABAP servers (CVE-2026-0507, CVSS 8.4).

Lacking authorizations in NetWeaver ABAP (CVE-2026-0506, CVSS 8.1) and Fiori apps (CVE-2026-0511 et al., CVSS 8.1) expose integrity and information leaks.​

Medium points cowl XSS in NetWeaver Portal (CVE-2026-0499, CVSS 6.1) and Enterprise Connector (CVE-2026-0514), open redirects, CSRF, and data disclosures in Fiori and SRM, all with community attain. Low-severity fixes deal with weak JNDI enter and out of date encryption in Id Administration and NW Java.​

Notice #CVE IDProductCVSS v3.1Priority3691059​CVE-2026-0492​SAP HANA​8.8​Excessive​3675151​CVE-2026-0507​ABAP/NetWeaver RFCSDK​8.4​Excessive​3688703​CVE-2026-0506​NetWeaver ABAP​8.1​Excessive​3565506​CVE-2026-0511​Fiori (Intercompany)​8.1​Excessive​

Directors should patch important notes instantly, SQL injection and RCE inside 24 hours, and code injections urgently to avert breaches in finance and monitoring instruments.

Check patches in staging environments first, prioritizing S/4HANA and HANA deployments widespread in enterprises. SAP stresses reviewing notes on the Help Portal and layering defenses like community segmentation till updates apply.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Day, January, Patch, SAP, Security

Post navigation

Previous Post: New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack
Next Post: Spanish Energy Company Endesa Hacked

Related Posts

CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability Cyber Security News
28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild Cyber Security News
Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access Cyber Security News
Microsoft Defender for Endpoint Bug Triggers Numerous False BIOS Alerts Cyber Security News
MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition Cyber Security News
Prioritizing Vulnerabilities in a Sea of Alerts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely
  • SAP’s January 2026 Security Updates Patch Critical Vulnerabilities
  • New Advanced Linux VoidLink Malware Targets Cloud and container Environments
  • What Should We Learn From How Attackers Leveraged AI in 2025?
  • Dutch Port Hacker Sentenced to Prison

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely
  • SAP’s January 2026 Security Updates Patch Critical Vulnerabilities
  • New Advanced Linux VoidLink Malware Targets Cloud and container Environments
  • What Should We Learn From How Attackers Leveraged AI in 2025?
  • Dutch Port Hacker Sentenced to Prison

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark