Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202602-00000008
[Content Description]
【CVE-2026-23687, CVSS: 8.8】This vulnerability exists in SAP NetWeaver AS ABAP and ABAP Platform, allowing an authenticated attacker with ordinary privileges to obtain valid signature information and send the updated signature XML file to the authenticator for verification.
【CVE-2026-0509, CVSS: 9.6】This vulnerability exists in SAP NetWeaver AS ABAP and ABAP Platform, allowing an authenticated attacker with low privileges to execute a backend remote function call without S_RFC authorization.
【CVE-2026-0488, CVSS: 9.9】An authenticated attacker could exploit a vulnerability in the common function module call vulnerability in SAP CRM and SAP S/4HANA (script editor) to execute unauthorized critical functions, including arbitrary SQL syntax.
[Influence Platform]
SAP NetWeaver Application Server ABAP and ABAP Platform Version(s) - KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 753, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.16, 9.18, 9.19
SAP CRM and SAP S/4HANA (Scripting Editor) Version(s) - S4FND 102, 103, 104, 105, 106, 107, 108, 109, SAP_ABA 700, WEBCUIF 700, 701, 730, 731, 746, 747, 748, 800, 801
SAP NetWeaver AS ABAP and ABAP Platform Version(s) - SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 804, SAP_BASIS 916, SAP_BASIS 917, SAP_BASIS 918
[Recommended Action]
Patch the issue according to the solution released on the official website: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/february-2026.html
[References]
1. https://www.twcert.org.tw/tw/cp-169-10717-00173-1.html