
Highlights of November SAP Security Notes analysis include:
- November Summary – Six new and updated SAP security patches released, including two HotNews Notes and four Medium Priority Notes
- SAP Business One requires Special Attention – Improper Access Control vulnerability can lead to considerable impact on confidentiality, integrity, and availability.
SAP has published six new and updated Security Notes on its November Patch Day (including the notes that were released or updated since last Patch Tuesday). This includes two HotNews Notes and four Medium Priority Notes.
Minor HotNews Note Update
SAP Security Note #3340576, tagged with a CVSS score of 9.8, was initially released on SAP’s September Patch Day. It patches a critical Missing Authorization Check in the SAP CommonCryptoLib that could result in a complete compromise of the affected application. SAP has released an update of the note with minor text changes affecting the referenced SAP Note in the Solution section for SAP HANA Database 2.0 customers on SPS06.
New HotNews Note for SAP Business One
The only new HotNews Note is SAP Security Note #3355658 which is tagged with a CVSS score of 9.6. This note patches an Improper Access Control Vulnerability caused by the SAP Business One installation process. The process allows anonymous users read and write access to the SMB shared folder. Affected components are Crystal Report (CR) shared folder, Traditional Mobile app (attachment path), RSP (log folder logic), Job Service and BAS (file upload folder).
Although the note only provides a hotfix for SAP Business One 10.0 SP 2308, installations on lower support package (SP) levels are also affected by the vulnerability. Since there is neither a hotfix nor an appropriate and safe workaround available for these lower SP levels, affected customers have to update their installation to SP 2308 and implement the provided hotfix. Customers should also read the referenced FAQ note #3400236.
Further New Security Notes
Two new Medium Priority Security Notes were released, both patching an Information Disclosure vulnerability tagged with a CVSS score of 5.3.
SAP Security Note #3362849 patches an Information Disclosure vulnerability in SAP NetWeaver Application Server ABAP and ABAP Platform allowing unauthenticated attackers to access unintended data. The note provides a kernel patch that fixes the affected ICM component. SAP NetWeaver Application Server Java is not affected.
SAP Security Note #3366410 patches an Information Disclosure vulnerability in SAP NetWeaver Application Server Java. An unauthenticated attacker can brute-force the login functionality in NetWeaver AS Java Logon application to identify legitimate user ids. According to the SAP Note, an exploit has only an impact on confidentiality, but not on integrity or availability.
Summary & Conclusions
Calm, calmer, calmest… This could be the motto of the last three SAP Patch Days. With only six new and updated SAP Security Notes, SAP’s November Patch Day is one of the quietest we’ve seen. Nevertheless, SAP Business One customers should react quickly and follow the instructions in SAP Security Note #3355658.
SAP Note | Type | Description | Priority | CVSS |
2494184 | Update | Cross-Site Request Forgery (CSRF) vulnerability in multiple SAP Sybase products
BC-SYB-SQA |
Medium | 6,3 |
3355658 | New | [CVE-2023-31403] Improper Access Control vulnerability in SAP Business One product installation
SBO-CRO-SEC |
Hot News | 9,6 |
3362849 | New | [CVE-2023-41366] Information Disclosure vulnerability in SAP NetWeaver Application Server ABAP and ABAP Platform
BC-CST-IC |
Medium | 5,3 |
3366410 | New | [CVE-2023-42480] Information Disclosure in NetWeaver AS Java Logon
BC-JAS-SEC |
Medium | 5,3 |
3333426 | Update | [CVE-2023-42477] Server-Side Request Forgery in SAP NetWeaver AS Java (GRMG Heartbeat application)
BC-JAS-ADM-MON |
Medium | 6,5 |
3340576 | Update | [CVE-2023-40309] Missing Authorization check in SAP CommonCryptoLib
BC-IAM-SSO-CCL |
Hot News | 9,8 |
As always, the Onapsis Research Labs will update The Onapsis Platform to incorporate the newly published vulnerabilities into the product, so our customers can protect their businesses.
For more information about the latest SAP security issues and our continuous efforts to share knowledge with the security community, view The Defenders Digest–our monthly video recap of ERP security news.
Source: Onapsis-Blog
Sie haben Fragen? Ihr Ansprechpartner für D/A/CH
Do you have any questions? Your contact person for D/A/CH
Fachartikel

ETH-Forschende entdecken neue Sicherheitslücke in Intel-Prozessoren

Sicherheitskontrollen im Wandel: Warum kontinuierliche Optimierung zur proaktiven Abwehr und einem stabilen Sicherheitsmanagement gehört

Massives Datenleck: 200 Milliarden Dateien in Cloud-Speichern öffentlich zugänglich

Windows 10: Mai-Update führt zu BitLocker-Wiederherstellungsschleife

Advanced NPM Supply-Chain Attack kombiniert Unicode-Steganografie mit Google Kalender als C2-Kanal
Studien

Princeton-Forscher warnen vor fatalen KI-Angriffen im Web3-Umfeld

Führungskräfte ohne KI-Wissen? Gartner-Umfrage offenbart Sorgen der CEOs

Schweigen über KI-Erfolge: Was eine neue Ivanti-Studie offenbart

IBM treibt den Einsatz generativer KI in Unternehmen mit hybrider Technologie voran

Weltweite Umfrage: Mehrheit der Technologieverantwortlichen spricht sich für Robotik im Arbeitsumfeld aus
Whitepaper

TeleTrusT legt aktualisiertes Positionspapier „Cyber-Nation“ vor

Sechs entscheidende Tipps für den erfolgreichen Einsatz von cIAM-Lösungen

Wie die Datenverwaltung Wachstum und Compliance fördert

Group-IB präsentiert die zehn gefährlichsten Cybergruppen 2025

Cyberkriminelle nehmen 2025 verstärkt das Gesundheitswesen ins Visier
Hamsterrad-Rebell

Insider – die verdrängte Gefahr

Sicherer SAP-Entwicklungsprozess: Onapsis Control schützt vor Risiken

Das CTEM-Framework navigieren: Warum klassisches Schwachstellenmanagement nicht mehr ausreicht

Cybersicherheit im Mittelstand: Kostenfreie Hilfe für Unternehmen
