:::

【資安漏洞預警】SAP針對旗下多款產品發布重大資安公告
[Security Vulnerability Alert] SAP Issues Major Cybersecurity Announcement for Multiple Products

公告類別:行政公告
發佈日期:2026/02/23 至 2026/09/23
點閱數:32

轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202602-00000008

[內容說明]
【CVE-2026-23687,CVSS:8.8】 此漏洞存在於SAP NetWeaver AS ABAP and ABAP Platform,允許經過身分驗證且具有普通權限的攻擊者,取得有效的簽章資訊後,將更新後的簽章 XML 文件傳送給驗證端進行驗證。

【CVE-2026-0509,CVSS:9.6】 此漏洞存在於SAP NetWeaver AS ABAP and ABAP Platform,允許經過身分驗證的低權限攻擊者,於未取得 S_RFC 授權時,可執行後端遠端函式呼叫。

【CVE-2026-0488,CVSS:9.9】 經過身分驗證的攻擊者可利用SAP CRM and SAP S/4HANA(腳本編輯器)中通用函數模組呼叫漏洞,執行未經授權的關鍵功能,包含執行任意SQL語法。

[影響平台]
SAP NetWeaver Application Server ABAP and ABAP Platform Version(s) - KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 753, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.16, 9.18, 9.19
 
SAP CRM and SAP S/4HANA (Scripting Editor) Version(s) - S4FND 102, 103, 104, 105, 106, 107, 108, 109, SAP_ABA 700, WEBCUIF 700, 701, 730, 731, 746, 747, 748, 800, 801
 
SAP NetWeaver AS ABAP and ABAP Platform Version(s) - SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 804, SAP_BASIS 916, SAP_BASIS 917, SAP_BASIS 918

[建議措施]
根據官方網站釋出的解決方式進行修補:https://support.sap.com/en/my-support/knowledge-base/security-notes-news/february-2026.html

[參考資料]
1. https://www.twcert.org.tw/tw/cp-169-10717-00173-1.html
Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202602-00000008

[Content Description]
【CVE-2026-23687, CVSS: 8.8】This vulnerability exists in SAP NetWeaver AS ABAP and ABAP Platform, allowing an authenticated attacker with ordinary privileges to obtain valid signature information and send the updated signature XML file to the authenticator for verification.

【CVE-2026-0509, CVSS: 9.6】This vulnerability exists in SAP NetWeaver AS ABAP and ABAP Platform, allowing an authenticated attacker with low privileges to execute a backend remote function call without S_RFC authorization.

【CVE-2026-0488, CVSS: 9.9】An authenticated attacker could exploit a vulnerability in the common function module call vulnerability in SAP CRM and SAP S/4HANA (script editor) to execute unauthorized critical functions, including arbitrary SQL syntax.

[Influence Platform]
SAP NetWeaver Application Server ABAP and ABAP Platform Version(s) - KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 753, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.16, 9.18, 9.19

SAP CRM and SAP S/4HANA (Scripting Editor) Version(s) - S4FND 102, 103, 104, 105, 106, 107, 108, 109, SAP_ABA 700, WEBCUIF 700, 701, 730, 731, 746, 747, 748, 800, 801

SAP NetWeaver AS ABAP and ABAP Platform Version(s) - SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 804, SAP_BASIS 916, SAP_BASIS 917, SAP_BASIS 918

[Recommended Action]
Patch the issue according to the solution released on the official website: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/february-2026.html

[References]
1. https://www.twcert.org.tw/tw/cp-169-10717-00173-1.html

相關附件

返回列表