Enterprise software provider SAP has recently patched various bugs in several products, including some vulnerabilities classified as “critical”. A total of 19 bugs have been fixed.
Critical vulnerabilities include those that could allow attackers to overwrite files, code injection, and access and manipulate data. Affected applications include SAP NetWeaver AS for Java, SAP NetWeaver Application Server for ABAP, SAP NetWeaver AP for ABAP, and the SAP Business Objects Business Intelligence Platform.
Of the remaining 14 vulnerabilities, four were rated high and ten were rated moderate. SAP is a popular software provider among businesses, making it a prime target for cyber criminals.
main goal
SAP is the largest ERP provider worldwide and holds almost a quarter of the global market share (24%) with more than 400,000 customers. In addition, nine out of ten of the Forbes Global 2000 companies use SAP products, including customer relationship management (CRM) and supply chain management (SCM) solutions.
> Thousands of SAP users are exposed to cyberattacks due to unsecured vulnerabilities (opens in new tab)
> SAP uncovers security vulnerabilities in certain cloud products (opens in new tab)
> Here are the best endpoint protection tools (opens in new tab)
Despite its popularity in the business world, there is little news about data breaches by SAP products. A little over a year ago, the US Cybersecurity and Infrastructure Security Agency (CISA) warned business users about a series of “serious security vulnerabilities” in SAP solutions that could lead to data theft and ransomware attacks.
And last year, corporate and government networks were compromised in an attack on unpatched SAP systems, serving as a strong reminder to apply security fixes to software as soon as they were released by the vendor.
The same advice applies to this new case, so make sure you patch your SAP systems as soon as possible.
- Here is our list of the best firewalls (opens in new tab)
Above: Beeping computer (opens in new tab)
This article was previously published on Source link