Your review has been sent successfully

SAP Update

3353
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

12 February, 2020

● High

2020-901

All

Description:

SAP has released security update to address multiple vulnerabilities in the following products:

  • SAP Business Client
    • Version 6.5
  • SAP Host Agent
    • Versions 7.21
  • SAP Landscape Management
    • Version 3.0
  • SAP ERP
    • Versions SAP_APPL 600, 602, 603, 604, 605, 606, 616, SAP_FIN 617, 618, 700, 720, 730
  • SAP S/4 HANA
    • Versions S4CORE 100, 101, 102, 103, 104, SAP_BASIS 7.50, 7.51, 7.52, 7.53, 7.54, 702, 730, 731, 740
  • SAP NetWeaver (Knowledge Management ICE Service)
    • Versions 7.30, 7.31, 7.40, 7.50, SAP_BASIS 7.40
  • SAP ABAP Platform
    • Versions SAP_BASIS 750, 751, 752, 753, 754
  • SAP NetWeaver AS Java (Heap Dump Application)
    • Versions - 7.30, 7.31, 7.40, 7.50
  • SAP Business Objects Business Intelligence Platform (CMC)
    • Versions 4.2
  • SAP NetWeaver (Guided Procedures)
    • Versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50
  • SAP Mobile Platform
    • Versions 3.0

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Missing Authorization Check.
  • Denial of service (DoS) attack.
  • Cross-site scripting (XSS) attack.

Best practice and Recommendations:

The CERT team encourages users to review SAP security advisory and apply the necessary updates:

Last updated at 12 February, 2020

Rate the content

rate-icon
up icon