On February 14th, 2023, SAP released their monthly product patches with significant security implications to their customers. SAP’s product portfolio is extensive and widely used by organizations to process critical business information. As a result, many businesses have established a regular and precise patch cycle, which typically begins with SAP’s Security Patch Day.
To ensure the utmost security, clients manually search for newly released security patches and scan their content. This effort requires sorting and filtering patches by relevance and priority. Once this is done, the implementation can commence. Most of the time, the SAP transaction code SNOTE is used to download and install the patch. However, this process requires expert knowledge and is not comparable to Windows’ automatic update.
Once the patch is installed, it can only be deployed into the development stack. The patch must undergo successful testing in the testing environment before promoting it into the production system. During a specific maintenance window, the critical correction(s) can be implemented into the production system to avoid any disruption to business operations.
The cycle starts again today, as it is the SAP Security Patch Day of February 2023.
SAP Security Patches February 2023
Today, we are highlighting the key updates released during SAP’s Security Patch Day in February 2023.
- SNote 20622600, titled “Security updates for the browser control Google Chromium delivered with SAP Business Client”, addresses a vulnerability with a CVSS score of 10.0. Google Chrome in SAP Business Client receives monthly updates. However, the scoring for vulnerabilities is often high, and therefore, the associated risks should not be underestimated. Depending on the sensitivity of the data processed by the application, the patch should be installed promptly.
Fortunately, this was the only SAP Security Patch that received HotNews status. However, the Patch Release contains four additional patches with high priority.
- SNote 3271091, titled “Privilege escalation vulnerability in SAP Business Planning and Consolidation”, addresses a vulnerability with a CVSS score of 8.5. The patch was updated an Version 6 is available. A malicious user may execute unauthorized transaction functionality. Under specific circumstances, a successful attack could enable an adversary to escalate their privileges to be able to read, change or delete system data. We recommend to implement the update of the previous version to ensure the patch offers effective protection.
- SNote 3256787, titled “Unrestricted Upload of File in SAP BusinessObjects Business Intelligence Platform”, addresses a vulnerability with a CVSS score of 8.4. Only authenticated and privileged accounts can be used to exploit this vulnerability. On successful exploitation however, attacker can perform operations that may completely compromise the application causing high impact on confidentiality, integrity and availability of the application.
Depending on the sensitivity of the data processed by the application, the patch should be installed promptly.
- SNote 3285757, titled “Privilege Escalation vulnerability in SAP Host Agent (Start Service)”, addresses a vulnerability with a CVSS score of 8.8. A non-admin user with local access to a server port assigned to the SAP Host Agent Service can execute an operating system command with admin privileges by submitting a specially crafted webservice request. This command can access and modify user and system data, potentially cause system outage.
It is highly recommended to implement the security patch immediately in order to address this vulnerability and prevent potential exploitation.
- SNote 3263135, titled “Information disclosure vulnerability in SAP BusinessObjects Business Intelligence platform”, addresses a vulnerability with a CVSS score of 8.5. An authenticated attacker can gain access to restricted sensitive information through SAP BusinessObjects Business Intelligence platform. Exploiting this information disclosure vulnerability could result in a significant impact on confidentiality and a limited impact on the application’s integrity.
It is recommended to implement the security patch in a timely manner to elemeniate this vulnerability and prevent potential exploitation.
Summary by Severity
The February release contains a total of 24 patches for the following severities: