【資安漏洞預警】SAP針對旗下多款產品發布重大資安公告
[Security Vulnerability Alert] SAP Issues Major Cybersecurity Announcement for Multiple Products

發布單位:圖資處數位服務組
日期範圍:2026/1/16 ~ 2026/7/16
 
發布單位:圖資處數位服務組
日期範圍:2026/1/16 ~ 2026/7/16
行政 行政公告
全體

轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202601-00000012

[內容說明]
【CVE-2026-0501,CVSS:9.9】 此漏洞存在於SAP S/4HANA私有雲和本地部署(Financials – General Ledger),由於輸入驗證不足,允許經過身分驗證的攻擊者利用特製的SQL指令進行讀取、修改和刪除後端資料庫資料。

【CVE-2026-0500,CVSS:9.6】 由於SAP Wily Introscope Enterprise Manager (WorkStation)使用易受攻擊的第三方元件,未經身分驗證的攻擊者可建立公開URL存取的惡意JNLP文件,導致受害者點擊URL時,Wily Introscope伺服器可在受害者電腦上執行作業系統命令。

【CVE-2026-0498,CVSS:9.1】 此漏洞存在於SAP S/4HANA的私有雲和本地部署,允許具有管理員權限的攻擊者透過RFC公開功能模組的漏洞,將任意ABAP程式碼/作業系統命令注入系統,從而繞過必要的授權檢查。

【CVE-2026-0491,CVSS:9.1】 SAP Landscape Transformation 允許擁有管理員權限的攻擊者利用RFC公開函數模組漏洞,將任意ABAP程式碼/作業系統命令注入系統,從而繞過必要的授權檢查。

【CVE-2026-0492,CVSS:8.8】 SAP HANA 資料庫存在權限提升漏洞,允許攻擊者擁有使用者的有效憑證,即可切換其他用戶,從而獲得管理員權限。

[影響平台]

SAP S/4HANA Private Cloud and On-Premise (Financials – General Ledger) S4CORE 102, 103, 104, 105, 106, 107, 108, 109版本

SAP Wily Introscope Enterprise Manager (WorkStation) WILY_INTRO_ENTERPRISE 10.8版本

SAP S/4HANA (Private Cloud and On-Premise) S4CORE 102, 103, 104, 105, 106, 107, 108, 109版本
 
SAP Landscape Transformation DMIS 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2018_1_752, 2020版本

SAP HANA database HDB 2.00版本

[建議措施]
根據官方網站釋出的解決方式進行修補:https://support.sap.com/en/my-support/knowledge-base/security-notes-news/january-2026.html

[參考資料]
1. https://www.twcert.org.tw/tw/cp-169-10634-69895-1.html

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202601-00000012

[Content Description]
【CVE-2026-0501, CVSS: 9.9】 This vulnerability exists in SAP S/4HANA private cloud and on-premises deployments (Financials – General Ledger). Due to insufficient input validation, it allows authenticated attackers to use specially crafted SQL commands to read, modify, and delete backend database data.

【CVE-2026-0500, CVSS: 9.6】 Because SAP Wily Introscope Enterprise Manager (WorkStation) uses vulnerable third-party components, unauthenticated attackers can create malicious JNLP files with publicly accessible URLs. When a victim clicks the URL, the Wily Introscope server can execute operating system commands on the victim's computer.

【CVE-2026-0498, CVSS: 9.1】This vulnerability exists in SAP S/4HANA's private cloud and on-premises deployments. It allows an attacker with administrator privileges to inject arbitrary ABAP code/operating system commands into the system by exploiting a vulnerability in a function module exposed in an RFC, thereby bypassing necessary authorization checks.

【CVE-2026-0491, CVSS: 9.1】This vulnerability in SAP Landscape Transformation allows an attacker with administrator privileges to exploit a vulnerability in a function module exposed in an RFC, thereby injecting arbitrary ABAP code/operating system commands into the system, thereby bypassing necessary authorization checks.

【CVE-2026-0492, CVSS: 8.8】This vulnerability in SAP HANA databases allows an attacker with valid user credentials to switch users and gain administrator privileges.

[Affected Platforms]
SAP S/4HANA Private Cloud and On-Premise (Financials – General Ledger) S4CORE versions 102, 103, 104, 105, 106, 107, 108, 109

SAP Wily Introscope Enterprise Manager (WorkStation) WILY_INTRO_ENTERPRISE version 10.8

SAP S/4HANA (Private Cloud and On-Premise) S4CORE versions 102, 103, 104, 105, 106, 107, 108, 109

SAP Landscape Transformation DMIS versions 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731 Version 2018_1_752, 2020

SAP HANA database HDB version 2.00

[Recommended Action]
Patch according to the solution released on the official website: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/january-2026.html

[References]
1. https://www.twcert.org.tw/tw/cp-169-10634-69895-1.html


相關附件
Top↑