Newsletters




SAP Releases Important Security Patches in Latest Portfolio Wide Update


SAP released 27 new and updated Security Notes, including six High Priority notes, during its July patch release. 

Onapsis Research Labs (ORL) supported SAP in patching a Missing Authorization Check vulnerability in the highly sensitive SAP Enterprise Extension Defense Forces & Public Security application.

ORL detected that one of the remote-enabled function modules of this application can be compromised due to a missing explicit authorization check, which can result in an escalation of privileges and impact the application’s confidentiality. 

These security patches include:

  • SAP Security Note #3212997, tagged with a CVSS score of 7.6, patches a critical Information disclosure vulnerability in integration scenarios of SAP B1 and SAP HANA. The vulnerability allows a highly privileged attacker to gain access to sensitive information such as high privileged account credentials, which could be used to help launch subsequent attacks. 
  • SAP Security Note #3157613, tagged with a CVSS score of 7.5, solves an issue in the license service API of SAP B1. A Missing Authentication Check allows an unauthenticated attacker to send malicious http requests over the network in order to break the application and make it inaccessible.
  • SAP Security Note #3191012, was another High Priority Note and was tagged with a CVSS score of 7.4. This note patches a code injection vulnerability in the SAP B1 client. The vulnerability enables a low privileged attacker to control the behavior of the application.
     

Additionally, SAP Security Note #2726124, tagged with a CVSS score of 6.3, was already released at the end of June. The note patches a Missing Authorization Check vulnerability in multiple components of SAP Automotive Solutions.

The impact on the application’s confidentiality, integrity, and availability is considered low but the exploit is relatively easy to perform since an attack can be started remotely and doesn’t require advanced privileges.

For more information about this news, visit https://onapsis.com.


Sponsors