SAP Family February 2024 Routine Security Update Advisory
Overview
SAP has made available an update that addresses vulnerabilities in the products it has been made. Users of affected versions are advised to update to the latest version.
Affected Products
CVE-2024-22131
- SAP Application Basis (ABA) versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I
CVE-2024-22126
- SAP_SE SAP NetWeaver AS Java (User Admin Application) 7.50 version
CVE-2024-24743
- SAP_SE SAP NetWeaver AS Java (Guided Procedures) Version 7.50
CVE-2024-22130
- SAP_SE SAP CRM WebClient UI S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, S4FND 108, WEBCUIF 700, WEBCUIF 701, WEBCUIF 730, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801 Versions
CVE-2024-22132
- SAP_SE All versions of SAP IDES Systems
CVE-2024-25642
- SAP_SE SAP Cloud Connector version 2.0
CVE-2023-49580
- SAP_SE SAP GUI for Windows and SAP GUI for Java SAP_BASIS 755, 756, 757, 758 versions
CVE-2024-24739
- SAP_SE SAP Bank Account Management (BAM) SAP_FIN 618, SAP_FIN 730, S4CORE 100, 101 versions
CVE-2024-22129
- SAP_SE SAP Companion 3.1.38 prior to versions
CVE-2024-24740
- SAP_SE SAP NetWeaver Application Server ABAP (SAP Kernel) KERNEL 7.53, 7.54, 7.77, 7.85, 7.89, 7.93, 7.94
- SAP_SE SAP NetWeaver Application Server ABAP (SAP Kernel) KRNL64UC 7.53
CVE-2024-22128
- SAP_SE SAP NetWeaver Business Client for HTML SAP_UI 754, 755, 756, 757, 758
- SAP_SE SAP NetWeaver Business Client for HTML SAP_BASIS 700, 701, 702, 731
CVE-2024-25643
- SAP_SE SAP Fiori app (My Overtime Requests) version 605
CVE-2024-24741
- SAP_SE SAP Master Data Governance Material 618, 619, 620, 621, 622, 800, 801, 803, 804
CVE-2024-24742
- SAP_SE SAP CRM (WebClient UI) S4FND 102, 103, 104, 105, 106
- SAP_SE SAP CRM (WebClient UI) WEBCUIF 701, 731, 746, 747, 748, 800, 801
CVE-2023-49058
- SAP_SE SAP Master Data Governance MDG_FND 731, 732, 746, 747, 748, 749, 752, 800. 802, 803, 804, 805, 806, 807, 808
- SAP_SE SAP Master Data Governance SAP_BS_FND 702
Resolved Vulnerabilities
Code Injection Vulnerability in SAP ABA (CVE-2024-22131, CVSS 9.1)
Cross Site Scripting Vulnerability in SAP NetWeaver AS Java (User Management Application) (CVE-2024-22126, CVSS 8.8)
XXE Vulnerability in SAP NetWeaver AS Java (CVE-2024-24743, CVSS 8.6)
XSS Vulnerability in CRM WebClient UI in SAP (CVE-2024-22130, CVSS 7.6)
Code Injection Vulnerability in SAP IDES system (CVE-2024-22132, CVSS 7.4)
Sensitive Information Access Vulnerability due to improper certificate validation in SAP Cloud Connector (CVE-2024-25642, CVSS 7.4)
Information Disclosure Vulnerability in SAP GUI for Windows and SAP GUI for Java (CVE-2023-49580, CVSS 7.3)
Missing Authorization Check Vulnerability in SAP Bank Account Management (BAM) (CVE-2024-24739, CVSS 6.3)
Cross Site Scripting (XSS) Vulnerability in SAP Companion (CVE-2024-22129, CVSS 5.4)
Information Disclosure Vulnerability in SAP NetWeaver Application Server ABAP (SAP Kernel) (CVE-2024-24740, CVSS 5.3)
Cross Site Scripting (XSS) vulnerability in SAP NetWeaver Business Client for HTML (CVE-2024-22128, CVSS 4.7)
Privilege Escalation Vulnerability due to failure to perform authorization checks for authenticated users in SAP Fiori apps (CVE-2024-25643, CVSS 4.3)
Privilege Escalation Vulnerability due to failure to perform authorization checks for authenticated users in SAP Master Data Governance for Material Data (CVE-2024-24741, CVSS 4.3)
Cross Ssite Scripting (XSS) Vulnerability in SAP CRM (WEBCLIENT UI) (CVE-2024-24742, CVSS 4.1)
Directory Traversal Vulnerability in SAP Master Data Governance (CVE-2023-49058, CVSS 3.5)
Vulnerability Patches
Vulnerability patches were made available in the February 13, 2024 update. Please follow the information on the reference site [1] to update to the latest vulnerability patch version.
Referenced Sites
[1] SAP Security Patch Day – February 2024
https://support.sap.com/en/my-support/knowledge-base/security-notes-news/february-2024.html
[2] CVE-2024-22131
https://www.cve.org/CVERecord?id=CVE-2024-22131
[3] CVE-2024-22126
https://www.cve.org/CVERecord?id=CVE-2024-22126
[4] CVE-2024-24743
https://www.cve.org/CVERecord?id=CVE-2024-24743
[5] CVE-2024-22130
https://www.cve.org/CVERecord?id=CVE-2024-22130
[6] CVE-2024-22132
https://www.cve.org/CVERecord?id=CVE-2024-22132
[7] CVE-2024-25642
https://www.cve.org/CVERecord?id=CVE-2024-25642
[8] CVE-2023-49580
https://www.cve.org/CVERecord?id=CVE-2023-49580
[9] CVE-2024-24739
https://www.cve.org/CVERecord?id=CVE-2024-24739
[10] CVE-2024-22129
https://www.cve.org/CVERecord?id=CVE-2024-22129
[11] CVE-2024-24740
https://www.cve.org/CVERecord?id=CVE-2024-24740
[12] CVE-2024-22128
https://www.cve.org/CVERecord?id=CVE-2024-22128
[13] CVE-2024-25643
https://www.cve.org/CVERecord?id=CVE-2024-25643
[14] CVE-2024-24741
https://www.cve.org/CVERecord?id=CVE-2024-24741
[15] CVE-2024-24742
https://www.cve.org/CVERecord?id=CVE-2024-24742
[16] CVE-2023-49058
https://www.cve.org/CVERecord?id=CVE-2023-49058