{"id":2115,"date":"2023-09-21T08:00:31","date_gmt":"2023-09-21T06:00:31","guid":{"rendered":"http:\/\/192.168.20.3\/?p=2115"},"modified":"2024-12-09T16:27:18","modified_gmt":"2024-12-09T15:27:18","slug":"sap-security-patch-day-septiembre-2023","status":"publish","type":"post","link":"https:\/\/orekait.com\/es\/sap-security-patch-day-septiembre-2023\/","title":{"rendered":"SAP Security Patch Day<br> <span class=\"font-300\">Septiembre 2023<\/span>"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Imagen principal&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2023\/09\/Security-Day-sept.jpg&#8221; alt=&#8221;cloud-public&#8221; title_text=&#8221;Security-Day-sept&#8221; admin_label=&#8221;Imagen principal&#8221; module_class=&#8221;post-img&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Cuerpo&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.25.2&#8243; header_2_font_size=&#8221;24px&#8221; header_3_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Continuando con nuestro empe\u00f1o en divulgar las \u00faltimas actualizaciones de seguridad SAP disponibles, traemos un nuevo post con el resumen del \u00faltimo Security Patch Day publicado por SAP.<\/p>\n<p>Comenzando con el an\u00e1lisis cuantitativo, en esta ocasi\u00f3n, SAP ha publicado 17 notas, de las cuales 2 son de importancia high, 4 son hot news.<\/p>\n<p>En esta ocasi\u00f3n, queremos\u00a0<strong>destacar las notas 3340576 y 3327896<\/strong>, ambas sobre una vulnerabilidad en el m\u00f3dulo CommonCryptoLib, y que se resuelven con una actualizaci\u00f3n de kernel, afectando a una cantidad importante de productos SAP por lo que es muy probable que los clientes se vean afectados.<\/p>\n<p><strong>2622660 \u2013 Security updates for the browser control Google Chromium delivered with SAP Business Client<\/strong><\/p>\n<p>SAP contin\u00faa actualizando la nota 2622660, una nota ya conocida por todos que recopila las \u00faltimas actualizaciones del navegador basado en Chromium integrado en SAP Business Client.<\/p>\n<p>En esta actualizaci\u00f3n, SAP mantiene al d\u00eda las versiones de SAP Business Client con las m\u00faltiples vulnerabilidades que se parchean en cada nueva versi\u00f3n de Chromium, por lo que es muy recomendable mantener actualizada la versi\u00f3n de SAP Bussines Client que estemos utilizando.<\/p>\n<p>En esta ocasi\u00f3n incluye la nueva versi\u00f3n de SAP Business Client 7.70 PL25 y PL23 incluye la nueva versi\u00f3n 116 de Chromium.<\/p>\n<p><strong>3320355 \u2013 Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Promotion Management)<\/strong><\/p>\n<p>La plataforma SAP BusinessObjects BI bajo ciertas condiciones permite a un atacante autenticado ver informaci\u00f3n confidencial que de otro modo estar\u00eda restringida. En caso de explotaci\u00f3n exitosa, el atacante puede comprometer completamente la aplicaci\u00f3n y causar un gran impacto en la confidencialidad, la integridad y la disponibilidad.<\/p>\n<p>En la nota 3320355 SAP indica las versiones de SP de los componentes SBOP BI PLATFORM SERVERS 4.3 y SBOP BI PLATFORM SERVERS 4.2 que resuelven esa vulnerabilidad.<\/p>\n<p><strong>3245526 \u2013 Code Injection vulnerability in SAP Business Objects Business Intelligence Platform (CMC)<\/strong><\/p>\n<p>Actualizacion de una vulnerabilidad en SAP Business Objects Intelligence Platform, que tratamos en el\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-marzo-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">Securiy Patch Day de marzo.<\/a><\/p>\n<p>Vulnerabilidad por la que mediante una inyecci\u00f3n de c\u00f3digo se podr\u00eda permitir que un atacante obtenga acceso a los recursos permitidos con privilegios adicionales. Un ataque exitoso podr\u00eda tener un gran impacto en la confidencialidad, la integridad y la disponibilidad del sistema.<\/p>\n<p>Como mitigaci\u00f3n inmediata SAP nos presenta el workaround definido en la nota 3245526, aunque la soluci\u00f3n recomendada es actualizar hasta el nivel de SP documentado en esta misma nota y que cubren esta vulnerabilidad.<\/p>\n<p><strong>3340576 \u2013 Missing Authorization check in SAP CommonCryptoLib<\/strong><\/p>\n<p>SAP CommonCryptoLib no realiza las comprobaciones de autenticaci\u00f3n necesarias, lo que puede dar como resultado comprobaciones de autorizaci\u00f3n inexistentes o incorrectas para un usuario autenticado, lo que resulta en una escalada de privilegios. Dependiendo de la aplicaci\u00f3n y del nivel de privilegios adquiridos, un atacante podr\u00eda abusar de la funcionalidad restringida a un grupo de usuarios en particular, as\u00ed como leer, modificar o eliminar datos restringidos.<\/p>\n<p>Esta vulnerabilidad afecta a los siguientes productos de SAP:<\/p>\n<ul>\n<li>SAP CommonCryptoLib, Versions \u2013 8<\/li>\n<li>SAP NetWeaver AS ABAP, SAP NetWeaver AS Java and ABAP Platform of S\/4HANA on-premise, Versions \u2013 KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KERNEL 7.22, KERNEL 8.04, KERNEL64UC 7.22, KERNEL64UC 7.22EXT, KERNEL64UC 7.53, KERNEL64UC 8.04, KERNEL64NUC 7.22, KERNEL64NUC 7.22EXT<\/li>\n<li>SAP Web Dispatcher, Versions \u2013 7.22EXT, 7.53, 7.54, 7.77, 7.85, 7.89<\/li>\n<li>SAP Content Server, Versions \u2013 6.50, 7.53, 7.54<\/li>\n<li>SAP HANA Database, Versions \u2013 2.0<\/li>\n<li>SAP Host Agent, Versions \u2013 722<\/li>\n<li>SAP Extended Application Services and Runtime (XSA), Versions \u2013 SAP_EXTENDED_APP_SERVICES 1, XS_ADVANCED_RUNTIME 1.00 Product \u2013 SAPSSOEXT, Versions \u2013 17<\/li>\n<\/ul>\n<p>Para resolver la vulnerabilidad, debemos aplicar la \u00faltima versi\u00f3n de kernel disponible o aplicar el hotfix dw_utils.sar.<\/p>\n<p><strong>3370490 \u2013 Insufficient File type validation in SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface)<\/strong><\/p>\n<p>Vulnerabilidad en la plataforma SAP BusinessObjects BI (interfaz HTML de Web Intelligence), debido a una validaci\u00f3n insuficiente del tipo de archivo, permite al creador de informes cargar archivos desde el sistema local al informe. Al cargar el archivo de imagen, un atacante autenticado podr\u00eda interceptar la solicitud, modificar el tipo de contenido y la extensi\u00f3n para leer y modificar datos sensibles causando un alto impacto en la confidencialidad e integridad de la aplicaci\u00f3n.<\/p>\n<p>Para resolver esta vulnerabilidad debemos actualizar a las versiones de SP indicadas en la nota 3370490.<\/p>\n<p><strong>3327896 \u2013 Memory Corruption vulnerability in SAP CommonCryptoLib<\/strong><\/p>\n<p>Vulnerabilidad en SAP CommonCryptoLib que permite a un atacante no autenticado crear una solicitud que, cuando se env\u00eda a un puerto abierto, provoca un error de corrupci\u00f3n de memoria en una biblioteca, lo que a su vez provoca que el componente de destino falle y generando una indisponibilidad del componente. No hay posibilidad de ver o modificar ninguna informaci\u00f3n.<\/p>\n<p>Esta vulnerabilidad afecta a los siguientes productos de SAP:<\/p>\n<ul>\n<li>Product \u2013 SAP CommonCryptoLib, Versions \u2013 8<\/li>\n<li>Product \u2013 SAP NetWeaver AS ABAP, SAP NetWeaver AS Java and ABAP Platform of S\/4HANA on-premise, Versions \u2013 KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KERNEL 7.22, KERNEL 8.04, KERNEL64UC 7.22, KERNEL64UC 7.22EXT, KERNEL64UC 7.53, KERNEL64UC 8.04, KERNEL64NUC 7.22, KERNEL64NUC 7.22EXT<\/li>\n<li>Product \u2013 SAP Web Dispatcher, Versions \u2013 7.22EXT, 7.53, 7.54, 7.77, 7.85, 7.89<\/li>\n<li>Product \u2013 SAP Content Server, Versions \u2013 6.50, 7.53, 7.54<\/li>\n<li>Product \u2013 SAP HANA Database, Versions \u2013 2.0<\/li>\n<li>Product \u2013 SAP Host Agent, Versions \u2013 722<\/li>\n<li>Product \u2013 SAP Extended Application Services and Runtime (XSA), Versions \u2013 SAP_EXTENDED_APP_SERVICES 1, XS_ADVANCED_RUNTIME 1.00<\/li>\n<li>Product \u2013 SAPSSOEXT, Versions \u2013 17<\/li>\n<\/ul>\n<p>Para resolver la vulnerabilidad, debemos aplicar la \u00faltima versi\u00f3n de kernel disponible o aplicar el hotfix dw_utils.sar.<strong><br \/><\/strong><\/p>\n<p><strong>En la siguiente tabla vemos todas las notas liberadas este mes para comprobar si aplican o no en vuestros sistemas:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table style=\"height: 559px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"height: 23px; width: 54.5125px;\"><strong>Note<\/strong><\/td>\n<td style=\"height: 23px; width: 717.763px;\"><strong>Title<\/strong><\/td>\n<td style=\"height: 23px; width: 57.5875px;\"><strong>Priority<\/strong><\/td>\n<td style=\"height: 23px; width: 38.1375px;\"><strong>CVSS<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"height: 47px; width: 54.5125px;\">2622660<\/td>\n<td style=\"height: 47px; width: 717.763px;\">Security updates for the browser control Google Chromium delivered with SAP Business Client<\/td>\n<td style=\"height: 47px; width: 57.5875px;\">Hot News<\/td>\n<td style=\"height: 47px; width: 38.1375px;\">10.0<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"height: 47px; width: 54.5125px;\">3320355<\/td>\n<td style=\"height: 47px; width: 717.763px;\">Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Promotion Management)<\/td>\n<td style=\"height: 47px; width: 57.5875px;\">Hot News<\/td>\n<td style=\"height: 47px; width: 38.1375px;\">9.9<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"height: 47px; width: 54.5125px;\">3245526<\/td>\n<td style=\"height: 47px; width: 717.763px;\">Code Injection vulnerability in SAP Business Objects Business Intelligence Platform (CMC)<\/td>\n<td style=\"height: 47px; width: 57.5875px;\">Hot News<\/td>\n<td style=\"height: 47px; width: 38.1375px;\">9.9<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"height: 47px; width: 54.5125px;\">3340576<\/td>\n<td style=\"height: 47px; width: 717.763px;\">Missing Authorization check in SAP CommonCryptoLib<\/td>\n<td style=\"height: 47px; width: 57.5875px;\">Hot News<\/td>\n<td style=\"height: 47px; width: 38.1375px;\">9.8<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"height: 47px; width: 54.5125px;\">3370490<\/td>\n<td style=\"height: 47px; width: 717.763px;\">Insufficient File type validation in SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface)<\/td>\n<td style=\"height: 47px; width: 57.5875px;\">High<\/td>\n<td style=\"height: 47px; width: 38.1375px;\">8.7<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"height: 23px; width: 54.5125px;\">3327896<\/td>\n<td style=\"height: 23px; width: 717.763px;\">Memory Corruption vulnerability in SAP CommonCryptoLib<\/td>\n<td style=\"height: 23px; width: 57.5875px;\">High<\/td>\n<td style=\"height: 23px; width: 38.1375px;\">7.5<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"height: 23px; width: 54.5125px;\">3357163<\/td>\n<td style=\"height: 23px; width: 717.763px;\">Code Injection vulnerability in SAP PowerDesignerClient<\/td>\n<td style=\"height: 23px; width: 57.5875px;\">Medium<\/td>\n<td style=\"height: 23px; width: 38.1375px;\">6.3<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"height: 23px; width: 54.5125px;\">3317702<\/td>\n<td style=\"height: 23px; width: 717.763px;\">Arbitrary File Delete via Directory Junction in SAP BusinessObjects Suite(installer)<\/td>\n<td style=\"height: 23px; width: 57.5875px;\">Medium<\/td>\n<td style=\"height: 23px; width: 38.1375px;\">6.2<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"height: 23px; width: 54.5125px;\">3156972<\/td>\n<td style=\"height: 23px; width: 717.763px;\">\u00a0URL Redirection vulnerability in SAP S\/4HANA(Manage Catalog Items and Cross-Catalog search)<\/td>\n<td style=\"height: 23px; width: 57.5875px;\">Medium<\/td>\n<td style=\"height: 23px; width: 38.1375px;\">6.1<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"height: 23px; width: 54.5125px;\">3149794<\/td>\n<td style=\"height: 23px; width: 717.763px;\">Cross-Site Scripting (XSS) vulnerabilities in jQuery-UI library bundled with SAPUI5<\/td>\n<td style=\"height: 23px; width: 57.5875px;\">Medium<\/td>\n<td style=\"height: 23px; width: 38.1375px;\">6.1<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"height: 47px; width: 54.5125px;\">3349805<\/td>\n<td style=\"height: 47px; width: 717.763px;\">Denial of service (DOS) vulnerability due to the usage of vulnerable version of Commons FileUpload in SAP Quotation Management Insurance (FS-QUO)<\/td>\n<td style=\"height: 47px; width: 57.5875px;\">Medium<\/td>\n<td style=\"height: 47px; width: 38.1375px;\">5.7<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"height: 23px; width: 54.5125px;\">3323163<\/td>\n<td style=\"height: 23px; width: 717.763px;\">Code Injection vulnerability in SAP NetWeaver AS ABAP (applications based on Unified Rendering)<\/td>\n<td style=\"height: 23px; width: 57.5875px;\">Medium<\/td>\n<td style=\"height: 23px; width: 38.1375px;\">5.5<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"height: 23px; width: 54.5125px;\">3326361<\/td>\n<td style=\"height: 23px; width: 717.763px;\">Missing Authorization check in S4CORE (Manage Purchase Contracts App)<\/td>\n<td style=\"height: 23px; width: 57.5875px;\">Medium<\/td>\n<td style=\"height: 23px; width: 38.1375px;\">5.4<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"height: 47px; width: 54.5125px;\">3352453<\/td>\n<td style=\"height: 47px; width: 717.763px;\">Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Version Management System)<\/td>\n<td style=\"height: 47px; width: 57.5875px;\">Medium<\/td>\n<td style=\"height: 47px; width: 38.1375px;\">5.3<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"height: 23px; width: 54.5125px;\">3348142<\/td>\n<td style=\"height: 23px; width: 717.763px;\">Missing Authentication check in SAP NetWeaver (Guided Procedures)<\/td>\n<td style=\"height: 23px; width: 57.5875px;\">Medium<\/td>\n<td style=\"height: 23px; width: 38.1375px;\">5.3<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"height: 23px; width: 54.5125px;\">3369680<\/td>\n<td style=\"height: 23px; width: 717.763px;\">External Entity Loop vulnerability in SAP S\/4HANA (Create Single Payment application)<\/td>\n<td style=\"height: 23px; width: 57.5875px;\">Low<\/td>\n<td style=\"height: 23px; width: 38.1375px;\">3.5<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>Este mes SAP ha liberado 17 notas de seguridad de las cuales 4 tienen una puntuaci\u00f3n CVSS por encima de 9.<\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>LOW<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>MEDIUM<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>HIGH<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>HOT NEWS<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Septiembre<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>17<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Agosto<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">7<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">8<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>18<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Julio<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">7<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>18<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Junio<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">8<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>13<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Mayo<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">10<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>24<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Abril<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">15<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>24<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Marzo<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">10<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Febrero<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">20<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Enero<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>12<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>TOTAL<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>8<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>84<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>38<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>22<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>154<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>El desglose de vulnerabilidades encontradas en los sistemas SAP ha sido el siguiente:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Marzo<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Abril<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Mayo<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Junio<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Julio<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Agosto<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Septiembre<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Clickjacking<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Code Injection<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>15<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Cross-Site Scripting<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>38<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Denial of Service<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>12<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Improper authentication<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>18<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Improper input validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>9<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Information Disclosure<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">12<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>28<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Memory corruption<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>7<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing Authorization Check<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing input Validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing XML Validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Remote Code Execution<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>5<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Server Side Request Forgery<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td>SQL Injection<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>5<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Otros<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">6<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>36<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>22<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>27<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>21<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>19<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>175<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>La diferencia de notas liberadas y vulnerabilidades es debido a que una nota puede solucionar m\u00faltiples vulnerabilidades.<\/strong><\/p>\n<p>Nos despedimos recomendando pasarse por el apartado de\u00a0<strong>security notes<\/strong>\u00a0de SAP ME y analizar las notas liberadas desde la \u00faltima actualizaci\u00f3n de nuestros sistemas e instalar las que apliquen a los sistemas de cada empresa.<\/p>\n<p>Art\u00edculos anteriores de este mismo a\u00f1o 2023:<\/p>\n<p><a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-abril-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">ABRIL 2023\u00a0<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-mayo-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">MAYO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-junio-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">JUNIO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-julio-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">JULIO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-agosto-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">AGOSTO 2023<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;M\u00e1s informaci\u00f3n&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"morado\">M\u00e1s informaci\u00f3n:<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/orekait.com\/es\/area-administracion-sistemas&#8221; button_text=&#8221;M\u00e1s informaci\u00f3n&#8221; module_class=&#8221;entrada-btn&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#8156EA&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_color=&#8221;#8156EA&#8221; button_border_radius=&#8221;30px&#8221; button_font=&#8221;Plus Jakarta Sans|600|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#8156EA&#8221; button_on_hover=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#8156EA&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#8156EA&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221; url_new_window=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; admin_label=&#8221;Noticias relacionadas titulo&#8221; module_id=&#8221;fondo-articulos&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_heading title=&#8221;Quizas te pueda interesar&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Noticias relacionadas&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-150px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;current&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Continuando con nuestro empe\u00f1o en divulgar las \u00faltimas actualizaciones de seguridad SAP disponibles, traemos un nuevo post con el resumen del \u00faltimo Security Patch Day publicado por SAP. Comenzando con el an\u00e1lisis cuantitativo, en esta ocasi\u00f3n, SAP ha publicado 17 notas, de las cuales 2 son de importancia high, 4 son hot news. En esta [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2117,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Lorem ipsum dolor sit amet consectetur adipiscing elit congue montes, imperdiet taciti erat elementum fermentum sem ante ultrices ridiculus, sagittis sociis egestas quisque ac semper quis odio. Aenean hendrerit ac metus dis nascetur aliquet mollis integer, rutrum vel laoreet posuere proin sagittis luctus est, tempus duis nisl ultrices parturient tempor praesent. Dignissim curabitur nascetur pellentesque augue fringilla pulvinar eros, tempus fames vehicula maecenas cubilia id, rutrum euismod integer ut scelerisque mus.\r\n\r\nVivamus auctor odio aenean rhoncus natoque dictum purus, volutpat pellentesque laoreet ridiculus consequat nisi varius euismod, augue platea convallis curae magnis taciti. Imperdiet nibh curabitur quisque orci consequat aenean pellentesque, cubilia duis senectus felis sed posuere tortor, magnis enim diam a odio sociis. Enim tellus nisl nec molestie augue luctus tempor habitant, nunc dictumst phasellus volutpat sem facilisis taciti, habitasse laoreet at turpis vel fermentum vulputate.","_et_gb_content_width":"","footnotes":""},"categories":[48,50],"tags":[],"class_list":["post-2115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-administracion-de-sistemas","category-sap-security-patch-day"],"_links":{"self":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/comments?post=2115"}],"version-history":[{"count":6,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2115\/revisions"}],"predecessor-version":[{"id":20747,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2115\/revisions\/20747"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media\/2117"}],"wp:attachment":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media?parent=2115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/categories?post=2115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/tags?post=2115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}