Have you heard about the note numbered CVE-2023-40309 with a severity of 9.8, announced by SAP at the October security patch day?
According to this note, SAP CommonCryptoLib does not perform the required authentication checks, which may result in missing or incorrect authorization checks for an authenticated user, leading to an escalation of privileges. Depending on the application and the level of privileges obtained, an attacker can abuse functions restricted to a specific group of users and read, modify, or delete restricted data.
Almost all ABAP and Java Kernels (including S/4HANA) are affected. Here is the list of affected kernels:
As you can see, the list is extensive.
A hotfix has been published for dw_utils.sar
and it must be applied to your system to address this vulnerability.
The critical question is, if an attacker was exploiting this vulnerability in your system, do you use a product that could detect the suspicious actions of this user?
Contact us to learn more and schedule a free demo of our product that detects security vulnerabilities in SAP systems. Ensure your systems are not only functional but also secure.
Unlock the secrets to SAP security with our ultimate guide, exploring best practices for protecting sensitive data, ensuring compliance, and enhancing business operations.
Explore the importance of SAP Security Audit Logs in enhancing the security of your SAP environment.
Learn how SAP audit event type codes for updates enhance accountability, data integrity, confidentiality, availability, and compliance.
Learn how to check and monitor SAP system ports using various methods including sapcontrol commands, OS-level tools, SAP GUI, and Python scripting.
How to Capture Data Changes in SAP Security Logs is essential for tracking SAP system activity. Learn the best practices to monitor and analyze SAP security logs.
Explore the importance of authorization objects in SAP systems and understand the critical tables that play a key role in SAP security.
Learn how to retrieve local files from a user's desktop using SAP GUI in SAP systems and understand the potential security risks involved.
Understand the importance of keeping SAP GUI versions updated for security and how to plan upgrades effectively.
Understand the different types of profile files and system parameters in SAP systems, and learn how DefenceMore's One Click Audit can help ensure their security.
Discover the vulnerabilities in your SAP systems and learn about DefenceMore's One Click Audit for SAP Systems.