SAP Patches 19 Vulnerabilities in September 2024 Patch Day
In September 2024, SAP took significant steps to enhance the security of its systems by releasing nineteen new and updated security notes. These updates are crucial for addressing vulnerabilities across various SAP products, ensuring that organizations can protect their sensitive data from potential threats.
Among the notable updates was HotNews Note #3479478, which received a high CVSS score of 9.8. This note addresses a critical missing authentication check vulnerability in the SAP BusinessObjects Business Intelligence Platform. This vulnerability posed a serious risk, allowing unauthorized access to sensitive data. Initially released in August, the updated note includes workaround solutions for users who may not be able to apply the patch immediately, extending the fix to the Enterprise software release 420.
Additionally, the High Priority Note #3459935, with a CVSS score of 7.4, tackles an information disclosure vulnerability in SAP Commerce Cloud. This update revised the recommended fix from Release 2211.27 to Release 2211.28, highlighting SAP's commitment to proactive security measures.
Key Vulnerabilities Addressed
SAP's September Patch Day focused on several critical vulnerabilities, including:
- Cross-Site Scripting (XSS) vulnerabilities in eProcurement on S/4HANA and the CRM Blueprint Application Builder Panel. These vulnerabilities, documented in SAP Security Notes #3497347 and #3501359, both rated at a CVSS score of 6.1, could allow attackers to inject malicious scripts, potentially compromising user data.
- A missing authorization check in SAP Production and Revenue Accounting was addressed in SAP Security Note #3488341. This vulnerability could allow unauthorized users to access sensitive information through a remote-enabled function module, but the patch now restricts access to authorized users only.
- SAP Security Note #3488039 addressed six additional vulnerabilities in RFC-enabled function modules, which could disrupt user access to SAP GUI. One significant vulnerability, tracked under CVE-2024-45285, could allow a low-privileged attacker to block a specific user from accessing SAP GUI by sending a crafted packet.
Join the conversation