{"id":3208,"date":"2023-04-18T08:00:31","date_gmt":"2023-04-18T06:00:31","guid":{"rendered":"http:\/\/192.168.20.3\/?p=3208"},"modified":"2025-01-23T11:03:21","modified_gmt":"2025-01-23T10:03:21","slug":"sap-security-patch-day-abril-2023","status":"publish","type":"post","link":"https:\/\/orekait.com\/es\/sap-security-patch-day-abril-2023\/","title":{"rendered":"SAP Security Patch Day<br> <span class=\"font-300\">Abril 2023<\/span>"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Imagen principal&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2023\/04\/Sap-Security-Patch-Day-abril.png&#8221; alt=&#8221;cloud-public&#8221; title_text=&#8221;Sap-Security-Patch-Day-abril&#8221; admin_label=&#8221;Imagen principal&#8221; module_class=&#8221;post-img&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Cuerpo&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.25.2&#8243; header_2_font_size=&#8221;24px&#8221; header_3_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Desde Oreka IT continuamos actualizando nuestro art\u00edculo mensual con las \u00faltimas notas de seguridad liberadas por SAP, en este post analizamos las \u00faltimas notas de seguridad liberadas por SAP y las explicamos de la manera m\u00e1s sencilla posible.<\/p>\n<p>En cuanto al an\u00e1lisis cuantitativo, en esta nueva publicaci\u00f3n del Security Patch Day, SAP ha publicado 24 notas, de las cuales 1 son de importancia high, y en esta ocasi\u00f3n 5 han sido clasificadas como hot news.<\/p>\n<p>Estas vulnerabilidades nos recuerdan la importancia de mantener nuestras aplicaciones corporativas actualizadas.<\/p>\n<p><strong>A continuaci\u00f3n, analizaremos estas 6 notas:<\/strong><\/p>\n<h2 class=\"has-medium-font-size\"><strong>3305369 \u2013 Multiple vulnerabilities in SAP Diagnostics Agent<\/strong><\/h2>\n<p><strong>La nota 3305369 documenta dos nuevas vulnerabilidades en SAP Diagnostic Agent, en su versi\u00f3n 720.<\/strong><\/p>\n<p>Vulnerabilidad CVE-2023-27497, debido a la falta de autenticaci\u00f3n y a una validaci\u00f3n de entrada insuficiente, EventLogServiceCollector permite que un atacante ejecute scripts maliciosos en todos los agentes de diagn\u00f3stico conectados que se ejecutan en Windows. En una explotaci\u00f3n exitosa, el atacante puede comprometer por completo la confidencialidad, la integridad y la disponibilidad del sistema.<\/p>\n<p>Vulnerabilidad CVE-2023-27267, debido a la falta de autenticaci\u00f3n y a una validaci\u00f3n de entrada insuficiente, OSCommand Bridge permite que un atacante con un conocimiento profundo del sistema ejecute scripts maliciosos en todos los agentes de diagn\u00f3stico conectados, independientemente del sistema operativo usado. En una explotaci\u00f3n exitosa, el atacante puede comprometer por completo la confidencialidad, la integridad y la disponibilidad del sistema.<\/p>\n<p>Para resolver estas vulnerabilidades debemos seguir los pasos indicados en la nota 3305369, y actualizar al menos hasta las versiones de software indicadas.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>2622660 \u2013 Patch Day: Security updates for the browser control Google Chromium delivered with SAP Business Client<\/strong><\/h2>\n<p>Nuevamente, SAP contin\u00faa actualizando la nota 2622660, una nota ya conocida por todos que recopila las \u00faltimas actualizaciones del navegador basado en chromium integrado en SAP Business Client.<\/p>\n<p>En esta ocasi\u00f3n SAP, mantiene al d\u00eda las versiones de SAP Business Client con las m\u00faltiples vulnerabilidades que se parchean en cada nueva versi\u00f3n de Chromium, por lo que es muy recomendable mantener actualizada la versi\u00f3n de SAP Bussines client que estemos utilizando.<\/p>\n<p>En esta ocasi\u00f3n incluye la nueva versi\u00f3n de SAP Business Client 7.70 PL21 incluye la nueva versi\u00f3n 111 de Chromium.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3273480 \u2013 Improper access control in SAP NetWeaver AS Java (User Defined Search)<\/strong><\/h2>\n<p>Actualizaci\u00f3n de la nota 3273480, que ya las hemos tratado en el\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-diciembre\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Patch Day de diciembre<\/a>.<\/p>\n<p>Mediante esta vulnerabilidad un atacante no autenticado a trav\u00e9s de la red puede conectarse a una interfaz abierta expuesta a trav\u00e9s de JNDI de SAP NetWeaver AS Java y hacer uso de una API para acceder a servicios que pueden usarse para realizar operaciones no autorizadas que afectan usuarios y datos en todo el sistema.<\/p>\n<p>SAP ha actualizado la informaci\u00f3n de la nota 3273480, actualizando el listado de versiones de SP que la resuelven, incluyendo el nuevo SP026 de la release 7.50.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3298961 \u2013 Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform<\/strong><\/h2>\n<p>Un atacante con privilegios b\u00e1sicos puede obtener acceso al archivo, cambiar y descifrar el archivo, obteniendo acceso a las contrase\u00f1as del usuario de BI y seg\u00fan los privilegios del usuario de BI, puede realizar operaciones que comprometan la aplicaci\u00f3n.<\/p>\n<p>Para resolver la vulnerabilidad debemos aplicar la versi\u00f3n de SP indicada en la nota 3298961, adem\u00e1s SAP ha documentado un workaround que podemos seguir para mitigar la vulnerabilidad.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3294595 \u2013 Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform<\/strong><\/h2>\n<p>SAP ha actualizado la nota 3294595, que ya analizamos en el\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-marzo-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Patch Day de marzo<\/a>\u00a0con nueva informaci\u00f3n en el apartado de \u201cSoluci\u00f3n\u201d.<\/p>\n<p>Se trata de una nueva vulnerabilidad en SAP NetWeaver AS for Java debido a la falta de verificaci\u00f3n de autenticaci\u00f3n, el servidor de aplicaciones SAP NetWeaver AS Java permite que un atacante no autenticado se conecte a una interfaz abierta y haga uso de una API abierta de nombres y directorios para acceder a servicios que pueden usarse para realizar operaciones no autorizadas que afectan a usuarios y servicios en todos los sistemas.<\/p>\n<p>En caso de conseguir explotar esta vulnerabilidad, el atacante puede leer y modificar cierta informaci\u00f3n confidencial, pero tambi\u00e9n puede usarse para bloquear elementos u operaciones del sistema pudiendo provocar una indisponibilidad.<\/p>\n<p>Podemos resolver esta vulnerabilidad actualizando hasta el nivel de SP indicado en la nota 3252433.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3305907\u00a0\u2013 Directory Traversal vulnerability in SAP NetWeaver (BI CONT ADD ON)<\/strong><\/h2>\n<p>Nueva vulnerabilidad en SAP Netweaver por la cual un atacante puede explotar una vulnerabilidad de Directory Traversal en un informe, para cargar y sobrescribir archivos en el servidor SAP. Los datos no se pueden leer, pero si un atacante remoto tiene suficientes privilegios (administrativos), los archivos del sistema operativo potencialmente cr\u00edticos se pueden sobrescribir y dejar el sistema indisponible.<\/p>\n<p>Para resolver esta vulnerabilidad podemos implementar la nota 3305907, o aplicar el nivel SP indicado en la misma.<\/p>\n<p><strong>En la siguiente tabla vemos todas las notas liberadas este mes para comprobar si aplican o no en vuestros sistemas:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Note<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>CVE<\/strong><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Title<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Priority<\/strong><\/td>\n<td><strong>CVSS<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3305369<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-27497]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Multiple vulnerabilities in SAP Diagnostics Agent(OSCommand Bridge and EventLogServiceCollector) Additional CVE \u2013 CVE-2023-27267<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Hot News<\/td>\n<td>10.0<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">2622660<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Update to Security Note released on April 2018 Patch Day: Security updates for the browser control Google Chromium delivered with SAP Business Client<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Hot News<\/td>\n<td>10.0<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3273480<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2022-41272]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Improper access control in SAP NetWeaver AS Java (User Defined Search)<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Hot News<\/td>\n<td>9.9<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3298961<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-28765]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Promotion Management)<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Hot News<\/td>\n<td>9.8<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3294595<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-27269]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Hot News<\/td>\n<td>9.6<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3305907<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-29186]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Directory Traversal vulnerability in SAP NetWeaver (BI CONT ADD ON)<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">High<\/td>\n<td>8.7<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3312733<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-26458]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Information Disclosure vulnerability in SAP Landscape Management<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3311624<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-29187]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0DLL Hijacking vulnerability in SapSetup (Software Installation Program)<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>6.7<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3289994<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-28761]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Missing Authentication check in SAP NetWeaver Enterprise Portal<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3290901<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-24528]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Missing Authorization Check in SAP Fiori apps for Travel Management in SAP ERP (My Travel Requests)<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3296378<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-28763]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Denial of Service in SAP NetWeaver AS for ABAP and ABAP Platform<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>\u00a06.5<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3275458<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-27499]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Cross-Site Scripting (XSS) vulnerability in SAP GUIfor HTML<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>\u00a06.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3309056<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-27897]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Code Injection vulnerability in SAP CRM<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>\u00a06.0<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3269352<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-29189]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0HTTP Verb Tampering vulnerability in SAP CRMWebClient UI<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>\u00a05.4<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3000663<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2021-33683]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0HTTP Request Smuggling in SAP Web Dispatcherand Internet Communication Manager<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>\u00a05.4<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3287784<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-24527]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Improper Access Control in SAP NetWeaver AS Javafor Deploy Service<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>\u00a05.3<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3303060<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-29185]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Denial of Service (DOS) in SAP NetWeaver AS forABAP (Business Server Pages)<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>\u00a05.3<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3315312<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-29108]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0IP filter vulnerability in ABAP Platform and SAPWeb Dispatcher<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>5.0<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3316509<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Remote Code Execution vulnerability in SAP CommerceRelated CVE \u2013 CVE-2020-13936<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>\u00a04.7<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3115598<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-29109]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Code Injection vulnerability in SAP ApplicationInterface Framework (Log Message View of Message Dashboard)<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>\u00a04.4<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3301457<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-1903]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Missing Authorization check in SAP HCM Fiori AppMy Forms (Fiori 2.0)<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Medium<\/td>\n<td>\u00a04.3<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3113349<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-29110]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Code Injection vulnerability in SAP ApplicationInterface Framework (Custom Hint of Message Dashboard)<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Low<\/td>\n<td>\u00a03.7<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3114489<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-29112]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Code Injection vulnerability in SAP ApplicationInterface Framework (Message Monitoring and Message Monitoring forAdministrators Application)<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Low<\/td>\n<td>\u00a03.7<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3117978<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">[CVE-2023-29111]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0Information Disclosure vulnerability in SAPApplication Interface Framework (ODATA service)<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Low<\/td>\n<td>\u00a03.1<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>Este mes SAP ha liberado 24 notas de seguridad de las cuales 6 tienen una puntuaci\u00f3n CVSS por encima de 9.<\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>LOW<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>MEDIUM<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>HIGH<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>HOT NEWS<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Abril<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">15<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>24<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Marzo<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">10<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Febrero<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">20<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Enero<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>12<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>TOTAL<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>3<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>50<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>10<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>16<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>81<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>El desglose de vulnerabilidades encontradas en los sistemas SAP ha sido el siguiente:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Enero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Febrero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Marzo<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Abril<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Clickjacking<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Code Injection<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>5<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Cross-Site Scripting<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">12<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Denial of Service<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Improper authentication<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>10<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Improper input validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>4<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Information Disclosure<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>5<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Memory corruption<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing Authorization Check<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>5<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing input Validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing XML Validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Remote Code Execution<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Server Side Request Forgery<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>SQL Injection<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Otros<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">6<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">6<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>11<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>16<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>28<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>22<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>27<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>66<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>La diferencia de notas liberadas y vulnerabilidades es debido a que una nota puede solucionar m\u00faltiples vulnerabilidades.<\/p>\n<p>Nos despedimos recomendando pasarse por el apartado de security notes del Launchpad de SAP y analizar las notas liberadas desde la \u00faltima actualizaci\u00f3n de nuestros sistemas e instalar las que apliquen a los sistemas de cada empresa.<\/p>\n<p>Art\u00edculos anteriores de este mismo a\u00f1o 2023:<\/p>\n<p><a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-enero-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">ENERO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-febrero-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">FEBRERO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-marzo-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">MARZO 2023<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;M\u00e1s informaci\u00f3n&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"morado\">M\u00e1s informaci\u00f3n:<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/orekait.com\/es\/area-administracion-sistemas&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;M\u00e1s informaci\u00f3n&#8221; module_class=&#8221;entrada-btn&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#8156EA&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_color=&#8221;#8156EA&#8221; button_border_radius=&#8221;30px&#8221; button_font=&#8221;Plus Jakarta Sans|600|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#8156EA&#8221; button_on_hover=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#8156EA&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#8156EA&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221;][\/et_pb_button][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; admin_label=&#8221;Noticias relacionadas titulo&#8221; module_id=&#8221;fondo-articulos&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_heading title=&#8221;Quizas te pueda interesar&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Noticias relacionadas&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-150px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;current&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2023\/06\/desviaciones-de-produccion-400&#215;402-1.png&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2023\/05\/sistemas-hosting.png&#8221; title_text=&#8221;sistemas-hosting&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Desde Oreka IT continuamos actualizando nuestro art\u00edculo mensual con las \u00faltimas notas de seguridad liberadas por SAP, en este post analizamos las \u00faltimas notas de seguridad liberadas por SAP y las explicamos de la manera m\u00e1s sencilla posible. En cuanto al an\u00e1lisis cuantitativo, en esta nueva publicaci\u00f3n del Security Patch Day, SAP ha publicado 24 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3210,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Lorem ipsum dolor sit amet consectetur adipiscing elit congue montes, imperdiet taciti erat elementum fermentum sem ante ultrices ridiculus, sagittis sociis egestas quisque ac semper quis odio. Aenean hendrerit ac metus dis nascetur aliquet mollis integer, rutrum vel laoreet posuere proin sagittis luctus est, tempus duis nisl ultrices parturient tempor praesent. Dignissim curabitur nascetur pellentesque augue fringilla pulvinar eros, tempus fames vehicula maecenas cubilia id, rutrum euismod integer ut scelerisque mus.\r\n\r\nVivamus auctor odio aenean rhoncus natoque dictum purus, volutpat pellentesque laoreet ridiculus consequat nisi varius euismod, augue platea convallis curae magnis taciti. Imperdiet nibh curabitur quisque orci consequat aenean pellentesque, cubilia duis senectus felis sed posuere tortor, magnis enim diam a odio sociis. Enim tellus nisl nec molestie augue luctus tempor habitant, nunc dictumst phasellus volutpat sem facilisis taciti, habitasse laoreet at turpis vel fermentum vulputate.","_et_gb_content_width":"","footnotes":""},"categories":[63,48,50],"tags":[],"class_list":["post-3208","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-hana","category-administracion-de-sistemas","category-sap-security-patch-day"],"_links":{"self":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/3208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/comments?post=3208"}],"version-history":[{"count":7,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/3208\/revisions"}],"predecessor-version":[{"id":24257,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/3208\/revisions\/24257"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media\/3210"}],"wp:attachment":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media?parent=3208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/categories?post=3208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/tags?post=3208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}