Skip to content

SAP Security Patch Day – August 2020

SAP security Patch day

Despite the holiday season the SAP Security Response team remains very active as we see with the August patch day. On 11th of August 2020 15 new Security Notes have been released. There was 1 updated to the CVSS-10 vulnerability already released last month.

With regards to CVE-2020-6287, also known as SAP RECON, SecurityBridge customers are already able to monitor for potential exploits through the Java stack. With the SecurityBridge August release (for availability check the secured product download page) dedicated controls have been released which will automatically identity unpatched Java modules or active services which shall be deactivated until the patch has been applied.

The SecurityBridge August release also provides updated signatures for existing sensors, to identify potential exploits for vulnerabilities described below. Interesting blog on this subject, Also checkout an interesting post on Virtual Patching.

Summary by Severity

The August release contains a total of 16 patches for the following severities:

Severity Number
Hot News
Note Description Severity CVSS
2934135 Update to Security Note released on July 2020 Patch Day:[CVE-2020-6287] Multiple Vulnerabilities in SAP NetWeaver AS JAVA (LM Configuration Wizard)Additional CVE - CVE-2020-6286
Product - SAP NetWeaver AS JAVA (LM Configuration Wizard); Versions - 7.30, 7.31, 7.40, 7.50
Hot News
2928635 [CVE-2020-6284] Cross-Site Scripting (XSS) vulnerability in SAP Netweaver (Knowledge Management)
Product - SAP NetWeaver (Knowledge Management); Versions - 7.30, 7.31, 7.40, 7.50  
Hot News
2927956 [CVE-2020-6294] Missing Authentication check in SAP BusinessObjects Business Intelligence Platform
Product - SAP Business Objects Business Intelligence Platform; Versions - 4.2, 4.3
2939685 [CVE-2020-6298] Missing Authorization check in SAP Banking Services (Generic Market Data)
Product - SAP Banking Services (Generic Market Data); Versions - 400, 450, 500 
2941667 [CVE-2020-6296] Code Injection Vulnerability in SAP NetWeaver (ABAP) and ABAP Platform
Product - SAP NetWeaver (ABAP Server) and ABAP Platform; Versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755 
2941315 [CVE-2020-6309] Missing Authentication check in SAP NetWeaver AS JAVA
Product - SAP NetWeaver AS JAVA (ENGINEAPI versions - 7.10, 7.10; WSRM versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50 and J2EE-FRMW versions - 7.10, 7.11)
2938162 [CVE-2020-6293] Unrestricted File Upload in SAP NetWeaver (Knowledge Management)
Product - SAP NetWeaver (Knowledge Management); Versions - 7.30, 7.31, 7.40, 7.50
2941332 [CVE-2020-6295] Information Disclosure in SAP Adaptive Server Enterprise
Product - SAP Adaptive Server Enterprise; Version - 16.0
2940823 [CVE-2020-6297] Information Disclosure in SAP Data Intelligence
Product - SAP Data Intelligence; Version - 3
2941170 Cross-Site Scripting (XSS) vulnerabilities in modified jQuery bundled with SAPUI5Related CVEs - CVE-2020-11022, CVE-2020-11023
Product - SAPUI5 (UISAPUI5_JAVA); Version - 7.50
Product - SAPUI5 (SAP_UI); Versions - 750, 751, 752, 753, 754, 755
Product - SAPUI5 (UI_700); Version - 200
2948317 Vulnerabilities in open source libraries used in SAP CommerceRelated CVEs - CVE-2020-9281, CVE-2019-11358
Product - SAP Commerce; Versions - 6.7, 1808, 1811, 1905, 2005
2949196 [CVE-2020-6301] Missing Authorization check in SAP ERP (HCM Travel Management)
Product - SAP ERP (HCM Travel Management); Versions - 600, 602, 603, 604, 605, 606, 607, 608 
2925827 [CVE-2020-6300] Cross-Site Scripting (XSS) vulnerability in SAP Business Objects Business Intelligence Platform(Central Management Console)
Product - SAP Business Objects Business Intelligence Platform (Central Management Console); Versions - 4.2, 4.3
2885671 [CVE-2020-6273] Missing Authorization check in SAP S/4 HANA (Fiori UI for General Ledger Accounting)
Product - SAP S/4 HANA (Fiori UI for General Ledger Accounting); Versions - 103, 104
2941510 [CVE-2020-6299] Information Disclosure in SAP NetWeaver (ABAP Server) and ABAP Platform
Product - SAP NetWeaver (ABAP Server) and ABAP Platform; Versions - 740, 750, 751, 752, 753, 754, 755 
2944988 [CVE-2020-6310] Information Disclosure in SAP NetWeaver (ABAP Server) and ABAP Platform
Product - SAP NetWeaver (ABAP Server) and ABAP Platform; Versions - 702, 730, 731, 740, 750 


Posted by

Christoph Nagy
SAP Security Comparison Report

Download the Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

Find recent Security Advisories for SAP©
DSAG Jahreskongress 2023
Alles verändert sich, nichts bleibt wie es ist, die heutige Zeit setzt Flexibilität voraus. Entsprechend wandelbar präsentieren sich DSAG, SAP und das gesamte Ökosystem. Diese Wandlungsfähigkeit steht auch im Fokus des DSAG-Jahreskongress 2023 vom 19.-21. September 2023 in Bremen. Unter dem Motto „Wunderbar wandelbar – Gemeinsam neue Perspektiven schaffen“ freut sich die DSAG wieder darauf, mehr als 5.000 Teilnehmende zu begrüßen. Wagen Sie gemeinsam mit der Interessenvertretung den Blick durch das Kaleidoskop und finden Sie den richtigen Dreh, um zu neuen Blickwinkeln zu gelangen und Veränderungen zu gestalten.
SAP security Patch day
SAP Security Patch Day
Today is another SAP Security Patch Day. In May 2023, the SAP Response Team released 20 SAP Security Notes, including Evergreen 2622660 Security updates for the browser control Google Chromium delivered with SAP Business Client with HotNews priority. Besides two updated Notes, SAP Security Patch Day May 2023, contains 18 new security updates for the vast SAP Product portfolio while the majority relates to SAP Business Objects.
SAP ABAP Directory Traversal Vulnerability
SAP developers know that ABAP/4 (Advanced Business Application Programming) is not immune to security vulnerabilities like any other programming language. One significant security risk associated with SAP ABAP is directory traversal vulnerability. In this blog post, we will discuss what a directory traversal vulnerability is, why it is a problem for SAP customers, how it can be exploited, and what measures to take to prevent it.