Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SAP Addresses Critical Code Injection in CRM and S/4HANA

SAP Addresses Critical Code Injection in CRM and S/4HANA

Posted on February 10, 2026 By CWS

SAP has released its February 2026 Security Patch Day updates, highlighting crucial fixes for vulnerabilities within SAP CRM and SAP S/4HANA. These updates are designed to mitigate risks across essential business operations, with 26 new SAP Security Notes and a revision to a previously issued note.

The monthly updates serve as a comprehensive guide for addressing vulnerabilities in SAP’s software suite. Customers are strongly advised to review the Support Portal and implement these patches swiftly to safeguard their systems.

Critical Vulnerabilities Addressed

One of the most pressing issues, CVE-2026-0488, is a code injection flaw in SAP CRM and SAP S/4HANA’s Scripting Editor. This vulnerability, which carries a CVSS score of 9.9, enables authenticated users with minimal privileges to execute arbitrary code, potentially impacting multiple systems. The fix is detailed in SAP Note 3697099.

Another significant vulnerability, CVE-2026-0509, involves a missing authorization check within SAP NetWeaver Application Server ABAP. This flaw, with a CVSS score of 9.6, allows low-privilege users to bypass critical authorization mechanisms, as outlined in SAP Note 3674774.

High-Severity Concerns

The updates also address high-severity issues like CVE-2026-23687, an XML Signature Wrapping vulnerability in SAP NetWeaver AS ABAP, which poses a risk to XML-based transaction integrity. Additionally, CVE-2026-23689 affects SAP Supply Chain Management through uncontrolled resource consumption, potentially leading to service disruptions.

SAP’s bulletin emphasizes the importance of addressing availability issues, particularly in systems exposed to public networks or user-facing interfaces. Such vulnerabilities can lead to denial of service attacks if not promptly patched.

Broader Impact and Recommendations

SAP BusinessObjects BI Platform and related components are flagged for multiple vulnerabilities, including denial-of-service and cross-site scripting (XSS) issues. These endpoints require careful assessment to prevent exploitation.

SAP continues to update its security measures to protect against evolving threats. Users are encouraged to apply these patches immediately and regularly monitor SAP’s communication channels for further updates. Maintaining a secure SAP environment is vital for operational continuity and data protection.

Stay informed about cybersecurity developments by following SAP’s updates on Google News, LinkedIn, and X. For further inquiries or to share your stories, contact us through our communication channels.

Cyber Security News Tags:Authorization, BusinessObjects, code injection, CRM, Cybersecurity, denial of service, information disclosure, NetWeaver, resource consumption, S/4HANA, SAP, security patch, Vulnerabilities, XML Signature

Post navigation

Previous Post: Google’s $32B Wiz Acquisition Gets EU Nod
Next Post: North Korean Operatives Exploit LinkedIn to Access Companies

Related Posts

Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web Cyber Security News
Senator Calls for FTC Investigation into Microsoft’s Use of Outdated RC4 Encryption and Kerberoasting Vulnerabilities Senator Calls for FTC Investigation into Microsoft’s Use of Outdated RC4 Encryption and Kerberoasting Vulnerabilities Cyber Security News
Apache ActiveMQ Flaw Enables DoS Attacks with Malformed Packets Apache ActiveMQ Flaw Enables DoS Attacks with Malformed Packets Cyber Security News
Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices Cyber Security News
Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports Cyber Security News
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark