Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
* Last update: 10/02/2026
* Affected products:
→ SAP CRM and SAP S/4HANA (Scripting Editor)
→ SAP NetWeaver Application Server ABAP and ABAP Platform* Type: CWE-862 Missing Authorization
* CVE/CVSS:
- CVE-2026-0488: CVSS 9.9 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)
- CVE-2026-0509: CVSS 9.6 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H)
SAP
On the 10th of February 2026, SAP published its monthly edition of the SAP Security Patch Day including 16 security notes and one security update.
In this advisory we cover the two critical vulnerabilities in scope: CVE-2026-0488 and CVE-2026-0509.
Exploitation does not require any user interaction, but it does require low privileges, and it can be conducted via the network.
It is unclear if the either one critical vulnerability has been actively exploited in the wild as there is no publicly available proof of concept.
If an attacker exploits CVE-2026-0488, that could cause a high impact in all three aspects of the CIA triad (Confidentiality, Integrity, Availability). However, if an attacker exploits CVE-2026-0509, that could cause a high impact in Integrity and Availability, but no impact in Confidentiality of the system.
CVE-2026-0488: A remote attacker with low privileges can exploit a flaw in a generic function module call in the SAP CRM and SAP S/4HANA to execute unauthorized critical functionalities. That can allow them to run SQL statements without any checks and compromise the whole database.
CVE-2026-0509: A remote attacker with low privileges can exploit this vulnerability in SAP NetWeaver Application Server ABAP and ABAP Platform to execute background Remote Function Calls (RFCs). That can allow the attacker to modify critical system functions and disrupt the network traffic.
For more details and for the full list of the recent SAP vulnerabilities and their patches, please refer to the SAP Security Patch Day - February 2026. https://support.sap.com/en/my-support/knowledge-base/security-notes-news/february-2026.html
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/cert/report-incident.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
NVD