Skip to content

SAP Security Patch Day – February 2023

SAP security Patch day

Posted by

Christoph Nagy
Find recent Security Advisories for SAP©

On February 14th, 2023, SAP released their monthly product patches with significant security implications to their customers. SAP’s product portfolio is extensive and widely used by organizations to process critical business information. As a result, many businesses have established a regular and precise patch cycle, which typically begins with SAP’s Security Patch Day.

To ensure the utmost security, clients manually search for newly released security patches and scan their content. This effort requires sorting and filtering patches by relevance and priority. Once this is done, the implementation can commence. Most of the time, the SAP transaction code SNOTE is used to download and install the patch. However, this process requires expert knowledge and is not comparable to Windows’ automatic update.

Webinar

Why SAP Security Patching isn't like Windows updates

Once the patch is installed, it can only be deployed into the development stack. The patch must undergo successful testing in the testing environment before promoting it into the production system. During a specific maintenance window, the critical correction(s) can be implemented into the production system to avoid any disruption to business operations.

The cycle starts again today, as it is the SAP Security Patch Day of February 2023.

SAP Security Patches February 2023

Today, we are highlighting the key updates released during SAP’s Security Patch Day in February 2023.

  • SNote 20622600, titled “Security updates for the browser control Google Chromium delivered with SAP Business Client”, addresses a vulnerability with a CVSS score of 10.0. Google Chrome in SAP Business Client receives monthly updates. However, the scoring for vulnerabilities is often high, and therefore, the associated risks should not be underestimated. Depending on the sensitivity of the data processed by the application, the patch should be installed promptly.

Fortunately, this was the only SAP Security Patch that received HotNews status. However, the Patch Release contains four additional patches with high priority.

Download the White Paper “Bridging the Gap – How SecurityBridge Supports NIST CSF in SAP Environments”. Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.
  • SNote 3271091, titled “Privilege escalation vulnerability in SAP Business Planning and Consolidation”, addresses a vulnerability with a CVSS score of 8.5. The patch was updated an Version 6 is available. A malicious user may execute unauthorized transaction functionality. Under specific circumstances, a successful attack could enable an adversary to escalate their privileges to be able to read, change or delete system data. We recommend to implement the update of the previous version to ensure the patch offers effective protection.

  • SNote 3256787, titled “Unrestricted Upload of File in SAP BusinessObjects Business Intelligence Platform”, addresses a vulnerability with a CVSS score of 8.4. Only authenticated and privileged accounts can be used to exploit this vulnerability. On successful exploitation however, attacker can perform operations that may completely compromise the application causing high impact on confidentiality, integrity and availability of the application.
    Depending on the sensitivity of the data processed by the application, the patch should be installed promptly.

  • SNote 3285757, titled “Privilege Escalation vulnerability in SAP Host Agent (Start Service)”, addresses a vulnerability with a CVSS score of 8.8. A non-admin user with local access to a server port assigned to the SAP Host Agent Service can execute an operating system command with admin privileges by submitting a specially crafted webservice request. This command can access and modify user and system data, potentially cause system outage.
    It is highly recommended to implement the security patch immediately in order to address this vulnerability and prevent potential exploitation.

  • SNote 3263135, titled “Information disclosure vulnerability in SAP BusinessObjects Business Intelligence platform”, addresses a vulnerability with a CVSS score of 8.5. An authenticated attacker can gain access to restricted sensitive information through SAP BusinessObjects Business Intelligence platform. Exploiting this information disclosure vulnerability could result in a significant impact on confidentiality and a limited impact on the application’s integrity.
    It is recommended to implement the security patch in a timely manner to elemeniate this vulnerability and prevent potential exploitation.

Summary by Severity

The February release contains a total of 24 patches for the following severities:

SeverityNumber
Hot News
1
High
4
Medium
18
Low
1
NoteDescriptionSeverityCVSS
2622660Security updates for the browser control Google Chromium delivered with SAP Business Client
Priority: HotNews
Released on: 10.04.2018
Components: BC-FES-BUS-DSK
Category: Program error
Hot News10,0
3271091[CVE-2022-41268] Privilege escalation vulnerability in SAP Business Planning and Consolidation
Priority: Correction with high priority
Released on: 13.12.2022
Components: EPM-BPC-NW
Category: Program error
High8,5
3256787[CVE-2023-24530] Unrestricted Upload of File in SAP BusinessObjects Business Intelligence Platform (CMC)
Priority: Correction with high priority
Released on: 14.02.2023
Components: BI-BIP-CMC
Category: Program error
High8,4
3287291[CVE-2023-23854] Missing Authorization check in SAP NetWeaver AS ABAP and ABAP Platform
Priority: Correction with low priority
Released on: 14.02.2023
Components: BC-DWB-TOO-ABA
Category: Program error
Low3,8
3285757[CVE-2023-24523] Privilege Escalation vulnerability in SAP Host Agent (Start Service)
Priority: Correction with high priority
Released on: 14.02.2023
Components: BC-CCM-HAG
Category: Program error
High8,8
2788178[CVE-2023-24525] Cross-Site Scripting (XSS) vulnerability in SAP CRM WebClient UI
Priority: Correction with medium priority
Released on: 14.02.2023
Components: CA-WUI-UI-TAG
Category: Program error
Medium4,3
2985905[CVE-2023-24524] Missing Authorization check in SAP S/4 HANA Map Treasury Correspondence Format Data
Priority: Correction with medium priority
Released on: 14.02.2023
Components: CA-GTF-CSC-DME
Category: Program error
Medium6,5
3275841[CVE-2023-23851] Unrestricted File Upload in SAP Business Planning and Consolidation
Priority: Correction with medium priority
Released on: 14.02.2023
Components: EPM-BPC-NW-INF
Category: Program error
Medium5,4
3293786[CVE-2023-23858] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
Priority: Correction with medium priority
Released on: 14.02.2023
Components: BC-ABA-LA
Category: Program error
Medium6,1
3281724[CVE-2023-0019] Missing Authorization check in SAP GRC (Process Control)
Priority: Correction with medium priority
Released on: 14.02.2023
Components: GRC-SPC-AC
Category: Program error
Medium6,5
3290901[CVE-2023-24528] Missing Authorization Check in SAP Fiori apps for Travel Management in SAP ERP (My Travel Requests)
Priority: Correction with medium priority
Released on: 14.02.2023
Components: FI-TV-ODT-MTR
Category: Program error
Medium6,5
3282663[CVE-2023-24529] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (Business Server Pages application)
Priority: Correction with medium priority
Released on: 14.02.2023
Components: CA-GTF-PCF
Category: Program error
Medium6,1
3274585[CVE-2023-25614] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework)
Priority: Correction with medium priority
Released on: 14.02.2023
Components: BC-BSP
Category: Program error
Medium6,1
3269118[CVE-2023-24522] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework)
Priority: Correction with medium priority
Released on: 14.02.2023
Components: BC-BSP
Category: Program error
Medium6,1
3269151[CVE-2023-24521] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework)
Priority: Correction with medium priority
Released on: 14.02.2023
Components: BC-BSP
Category: Program error
Medium6,1
3271227[CVE-2023-23853] URL Redirection vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform
Priority: Correction with medium priority
Released on: 14.02.2023
Components: BC-MID-ICF
Category: Program error
Medium6,1
3268959[Multiple CVEs] Multiple vulnerabilities in SAP NetWeaver AS for ABAP and ABAP Platform
Priority: Correction with medium priority
Released on: 14.02.2023
Components: BC-MID-AC
Category: Program error
Medium6,1
3266751[CVE-2023-23852] Cross-Site Scripting (XSS) vulnerability in SAP Solution Manager 7.2
Priority: Correction with medium priority
Released on: 14.02.2023
Components: SV-SMG-MON-SYS
Category: Program error
Medium6,1
3265846[CVE-2023-0024] Cross Site Scripting in SAP Solution Manager (BSP Application)
Priority: Correction with medium priority
Released on: 14.02.2023
Components: SV-SMG-SVD-SWB
Category: Program error
Medium6,5
3267442[CVE-2023-0025] Cross Site Scripting in SAP Solution Manager (BSP Application)
Priority: Correction with medium priority
Released on: 14.02.2023
Components: SV-SMG-SVD-SWB
Category: Program error
Medium6,5
3270509[CVE-2023-23855] URL Redirection vulnerability in SAP Solution Manager
Priority: Correction with medium priority
Released on: 14.02.2023
Components: SV-SMG-OP
Category: Program error
Medium6,5
3263135[CVE-2023-0020] Information disclosure vulnerability in SAP BusinessObjects Business Intelligence platform
Priority: Correction with high priority
Released on: 14.02.2023
Components: BI-BIP-INV
Category: Program error
High8,5
3263863[CVE-2023-23856] Cross-Site Scripting (XSS) vulnerability in Web Intelligence Interface
Priority: Correction with medium priority
Released on: 14.02.2023
Components: BI-RA-WBI-FE
Category: Program error
Medium4,3
3262544[CVE-2022-41262] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS for Java (Http Provider Service)
Priority: Correction with medium priority
Released on: 13.12.2022
Components: BC-JAS-WEB
Category: Program error
Medium6,1
SAP security by design
Security-by-design is a principle that emphasizes the need to build security measures into software systems from the start rather than as an afterthought. SAP projects need to embed security conciseness to respect this principle and gain a cyber-resilient application. Thus, they should prioritize security when designing and implementing their SAP systems rather than attempting to bolt on security measures afterward. This can help to prevent security breaches and minimize the damage caused by cyberattacks.
coding
Remote Code Execution (RCE) vulnerability in SAP is a type of security issue that allows an attacker to execute arbitrary code on a target system remotely. has gained control of a user's click, they can execute a range of actions, such as transferring funds, changing user settings, or stealing sensitive data.
Management Dashboard
SAP security provider SecurityBridge—now operating in the U.S.—today announced the latest addition to the SecurityBridge Platform—the Management Dashboard for SAP security. The SAP Management Dashboard is a no-cost, additional application for the existing SecurityBridge Platform that combines all SAP data aspects and presents the information through a customizable, single pane of glass security dashboard view.
Hacker mining SAPsecurity
SAP Cybersecurity- SAP Vulnerability
In recent years, cyberattacks against SAP systems have become more common, with attackers gaining network access and then exploring critical applications through port scanning and script-based exploration. Two examples of such attacks that use the SAP RFC SDK are the password lock attack and the password spray attack. In this article, we will outline how to detect these script-based attacks against SAP.