Your review has been sent successfully

SAP Update

2109
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

14 July, 2020

● Critical

2020-1483

All

Description:

SAP has released security update to address multiple vulnerabilities in the following products:

  • SAP NetWeaver AS JAVA (LM Configuration Wizard)
    • 7.30, 7.31, 7.40, 7.50
  • SAP Business Client
    • 6.5
  • SAP NetWeaver (XML Toolkit for JAVA)
    • ENGINEAPI 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50
  • SAP Disclosure Management
    • 1.0
  • SAP Business Objects Business Intelligence Platform (BI Launchpad)
    • 4.2
  • SAP Business Objects Business Intelligence Platform (bipodata)
    • 4.2
  • SAP NetWeaver AS JAVA (IIOP service) (SERVERCORE)
    • 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50
  • Product - SAP NetWeaver AS JAVA (IIOP service) (CORE-TOOLS)
    • 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50
  • SAP Business Objects Business Intelligence Platform (BI Launchpad and CMC)
    • 4.1, 4.2
  • SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface)
    • 4.1, 4.2
  • SAP NetWeaver (ABAP Server) and ABAP Platform
    • 731, 740, 750

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Information disclosure.
  • Missing Authentication.
  • Cross-site scripting (XSS) attack.
  • Cross-site request forgery (CSRF).

Best practice and Recommendations:

The CERT team encourages users to review SAP security advisory and apply the necessary updates:

Last updated at 14 July, 2020

Rate the content

rate-icon
up icon