SAP Security Patch Day – August 2020

SAP security Patch day

Despite the holiday season the SAP Security Response team remains very active as we see with the August patch day. On 11th of August 2020 15 new Security Notes have been released. There was 1 updated to the CVSS-10 vulnerability already released last month.

With regards to CVE-2020-6287, also known as SAP RECON, SecurityBridge customers are already able to monitor for potential exploits through the Java stack. With the SecurityBridge August release (for availability check the secured product download page) dedicated controls have been released which will automatically identity unpatched Java modules or active services which shall be deactivated until the patch has been applied.

The SecurityBridge August release also provides updated signatures for existing sensors, to identify potential exploits for vulnerabilities described below. Interesting blog on this subject, Also checkout an interesting post on Virtual Patching.

Summary by Severity

The August release contains a total of 16 patches for the following severities:

Severity Number
Hot News
2
High
6
Medium
8
Note Description Severity CVSS
2934135 Update to Security Note released on July 2020 Patch Day:[CVE-2020-6287] Multiple Vulnerabilities in SAP NetWeaver AS JAVA (LM Configuration Wizard)Additional CVE - CVE-2020-6286
Product - SAP NetWeaver AS JAVA (LM Configuration Wizard); Versions - 7.30, 7.31, 7.40, 7.50
Hot News
10
2928635 [CVE-2020-6284] Cross-Site Scripting (XSS) vulnerability in SAP Netweaver (Knowledge Management)
Product - SAP NetWeaver (Knowledge Management); Versions - 7.30, 7.31, 7.40, 7.50  
Hot News
9
2927956 [CVE-2020-6294] Missing Authentication check in SAP BusinessObjects Business Intelligence Platform
Product - SAP Business Objects Business Intelligence Platform; Versions - 4.2, 4.3
High
8.5
2939685 [CVE-2020-6298] Missing Authorization check in SAP Banking Services (Generic Market Data)
Product - SAP Banking Services (Generic Market Data); Versions - 400, 450, 500 
High
8.3
2941667 [CVE-2020-6296] Code Injection Vulnerability in SAP NetWeaver (ABAP) and ABAP Platform
Product - SAP NetWeaver (ABAP Server) and ABAP Platform; Versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755 
High
8.3
2941315 [CVE-2020-6309] Missing Authentication check in SAP NetWeaver AS JAVA
Product - SAP NetWeaver AS JAVA (ENGINEAPI versions - 7.10, 7.10; WSRM versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50 and J2EE-FRMW versions - 7.10, 7.11)
High
7.5
2938162 [CVE-2020-6293] Unrestricted File Upload in SAP NetWeaver (Knowledge Management)
Product - SAP NetWeaver (Knowledge Management); Versions - 7.30, 7.31, 7.40, 7.50
High
7.3
2941332 [CVE-2020-6295] Information Disclosure in SAP Adaptive Server Enterprise
Product - SAP Adaptive Server Enterprise; Version - 16.0
High
7
2940823 [CVE-2020-6297] Information Disclosure in SAP Data Intelligence
Product - SAP Data Intelligence; Version - 3
Medium
6.3
2941170 Cross-Site Scripting (XSS) vulnerabilities in modified jQuery bundled with SAPUI5Related CVEs - CVE-2020-11022, CVE-2020-11023
Product - SAPUI5 (UISAPUI5_JAVA); Version - 7.50
Product - SAPUI5 (SAP_UI); Versions - 750, 751, 752, 753, 754, 755
Product - SAPUI5 (UI_700); Version - 200
Medium
6.1
2948317 Vulnerabilities in open source libraries used in SAP CommerceRelated CVEs - CVE-2020-9281, CVE-2019-11358
Product - SAP Commerce; Versions - 6.7, 1808, 1811, 1905, 2005
Medium
6.1
2949196 [CVE-2020-6301] Missing Authorization check in SAP ERP (HCM Travel Management)
Product - SAP ERP (HCM Travel Management); Versions - 600, 602, 603, 604, 605, 606, 607, 608 
Medium
5.4
2925827 [CVE-2020-6300] Cross-Site Scripting (XSS) vulnerability in SAP Business Objects Business Intelligence Platform(Central Management Console)
Product - SAP Business Objects Business Intelligence Platform (Central Management Console); Versions - 4.2, 4.3
Medium
4.8
2885671 [CVE-2020-6273] Missing Authorization check in SAP S/4 HANA (Fiori UI for General Ledger Accounting)
Product - SAP S/4 HANA (Fiori UI for General Ledger Accounting); Versions - 103, 104
Medium
4.3
2941510 [CVE-2020-6299] Information Disclosure in SAP NetWeaver (ABAP Server) and ABAP Platform
Product - SAP NetWeaver (ABAP Server) and ABAP Platform; Versions - 740, 750, 751, 752, 753, 754, 755 
Medium
4.3
2944988 [CVE-2020-6310] Information Disclosure in SAP NetWeaver (ABAP Server) and ABAP Platform
Product - SAP NetWeaver (ABAP Server) and ABAP Platform; Versions - 702, 730, 731, 740, 750 
Medium
4.3

Source

Posted by

Christoph Nagy
Share on linkedin
Share on twitter
Share on email
SAP Security Comparison Report

Download the Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

Find recent Security Advisories for SAP©
Webinar SAP patch
The webinar, taking place on 05.10.2022, is all about SAP Patch Management and its challenges. The German-speaking SAP User Group (DSAG) and the American colleagues of ASUG asked why SAP security patching cannot be as simple and effective as, for example, Windows updates.
S/4HANA migration
SAP Cybersecurity- SAP Security Automation- Security News
“There are a few constants in life” – a statement that also applies to the SAP user community. It has always been a challenge for SAP customers to bring their large SAP environments to a current release level. Although the vendor has done a lot in the past to simplify this, it is still not a complex undertaking.
SecurityBridge
Here at SecurityBridge, we are extremely lucky to have a team full of amazing professionals. Thanks to our team, we have achieved extraordinary things in the past couple of years. With that in mind, we thought it was time for us to start introducing you to the team that drives everything behind the scenes. And we couldn't have chosen a better example to start with than our very own, Harish Dahima! Read on and learn all about Harish's life as a Senior Product Developer, his role, and life at SecurityBridge.
SAP Cloud Connector
SAP Cloud Security- SAP Cybersecurity- Security News
Every organization constantly faces the challenge of minimizing the attack surface that an adversary could use to perform malicious operations. To do this, administrators must install the deployed components and understand them in detail to identify risks and proactively mitigate or prevent those. Today we are looking at what is necessary to protect the SAP Cloud Connector.