{"id":3674,"date":"2023-02-23T08:00:31","date_gmt":"2023-02-23T07:00:31","guid":{"rendered":"http:\/\/192.168.20.3\/?p=3674"},"modified":"2024-12-10T09:44:05","modified_gmt":"2024-12-10T08:44:05","slug":"sap-security-patch-day-febrero-2023","status":"publish","type":"post","link":"https:\/\/orekait.com\/es\/sap-security-patch-day-febrero-2023\/","title":{"rendered":"SAP Security Patch Day<br> <span class=\"font-300\">Febrero<\/span>"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Imagen principal&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2023\/02\/Patch-Day-febrero.png&#8221; alt=&#8221;cloud-public&#8221; title_text=&#8221;Patch-Day-febrero&#8221; admin_label=&#8221;Imagen principal&#8221; module_class=&#8221;post-img&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Cuerpo&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.25.2&#8243; header_2_font_size=&#8221;24px&#8221; header_3_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Continuando con nuestro empe\u00f1o en divulgar las \u00faltimas actualizaciones de seguridad SAP disponibles, traemos un nuevo post con el resumen del Security Patch Day de febrero, en este post analizamos las \u00faltimas notas de seguridad liberadas por SAP y las explicamos de la manera m\u00e1s sencilla posible.<\/p>\n<p>Nuevamente la nota destacada por SAP es la\u00a0<strong>2622660\u00a0<\/strong>ya que es la \u00fanica\u00a0<strong>Hot New de febrero<\/strong>. Siendo esta una antigua conocida del blog ya que es la nota que contiene las \u00faltimas actualizaciones de Chromium para SAP Business Client. Pero nosotros queremos\u00a0<strong>destacar la nota 3285757\u00a0<\/strong>porque aplica al servicio SAP Host Agent, un servicio presente en casi todos los sistemas SAP, y que en caso de ser explotada puede tener implicaciones importantes.<\/p>\n<p>En cuanto al an\u00e1lisis cuantitativo, en esta nueva publicaci\u00f3n del security patch day, SAP ha publicado 26 notas, de las cuales 6 son de importancia\u00a0<em>high<\/em>, y en esta ocasi\u00f3n s\u00f3lo una ha sido clasificada c\u00f3mo\u00a0<em>hot news<\/em>.<\/p>\n<p>Estas vulnerabilidades nos recuerdan la importancia de mantener nuestras aplicaciones corporativas actualizadas.<\/p>\n<p><strong>A continuaci\u00f3n, analizaremos estas 7 notas:<\/strong><\/p>\n<p><strong>2622660 \u2013 [Update] Security updates for the browser control Google Chromium delivered with SAP Business Client<\/strong><\/p>\n<p>SAP contin\u00faa actualizando la nota 2622660, una nota ya conocida por todos que recopila las \u00faltimas actualizaciones del navegador basado en chromium integrado en SAP Business Client.<\/p>\n<p>En esta ocasi\u00f3n SAP, mantiene al d\u00eda las versiones de SAP Business Client con las m\u00faltiples vulnerabilidades que se parchean en cada nueva versi\u00f3n de chromium, por lo que es muy recomendable mantener actualizada la versi\u00f3n de SAP Bussines client que estemos utilizando.<\/p>\n<p>En esta ocasi\u00f3n la nueva versi\u00f3n de SAP Business Client 7.70 PL20 incluye la nueva versi\u00f3n 109 de Chromium.<\/p>\n<p><strong>3285757 \u2013 [CVE-2023-24523]\u00a0\u00a0\u00a0\u00a0\u00a0 Privilege Escalation vulnerability in SAP Start Service<\/strong><\/p>\n<p>Un atacante autenticado como usuario no administrador con acceso local a un puerto del servidor asignado al Servicio del SAP Host Agent, puede enviar una solicitud de servicio web con un comando del sistema operativo que se ejecutar\u00e1 con privilegios de administrador. El comando del sistema operativo puede leer o modificar cualquier usuario o datos del sistema y puede provocar la indisponibilidad del sistema.<\/p>\n<p>La soluci\u00f3n a esta vulnerabilidad pasa por actualizar SAP Host Agent a la \u00faltima versi\u00f3n liberada.<\/p>\n<p><strong>3268172 \u2013 [CVE-2022-41264]\u00a0\u00a0\u00a0\u00a0\u00a0 Update to Security Note released on December 2022 Patch Day: Code Injection vulnerability in SAP BASIS<\/strong><\/p>\n<p>Debido al alcance ilimitado del m\u00f3dulo de funci\u00f3n RFC, SAP BASIS permite que un atacante no administrador autenticado acceda a una clase de sistema y ejecute cualquiera de sus m\u00e9todos p\u00fablicos con par\u00e1metros proporcionados por el atacante. En caso de una explotaci\u00f3n exitosa, el atacante puede tener el control total del sistema, lo que provoca un alto impacto en la integridad de la aplicaci\u00f3n.<\/p>\n<p>Para resolver esta vulnerabilidad, debemos implementar la nota 3268172, esta nota desactiva el c\u00f3digo obsoleto que permite esta vulnerabilidad. El c\u00f3digo que se desactiva \u00fanicamente ser\u00e1 usado por un report de BW en HANA. SAP remarca que aunque no dispongamos de BD HANA debemos comprobar si la nota nos aplica, e implementarla siempre que sea posible.<\/p>\n<p><strong>3263135 \u2013 -[CVE-2023-0020]\u00a0\u00a0\u00a0\u00a0\u00a0 Information disclosure vulnerability in SAP BusinessObjects Business Intelligence platform<\/strong><\/p>\n<p>Vulnerabilidad por la que la plataforma SAP BusinessObjects Business Intelligence permite que un atacante autenticado acceda a informaci\u00f3n confidencial que, de otro modo, estar\u00eda restringida. En una explotaci\u00f3n exitosa, podr\u00eda darse un alto impacto en la confidencialidad y un impacto limitado en la integridad de la aplicaci\u00f3n.<\/p>\n<p>Para solucionar esta vulnerabilidad debemos actualizar al menos hasta los SP indicados en la nota 3263135.<\/p>\n<p><strong>3271091 \u2013 [CVE-2022-41268]\u00a0\u00a0\u00a0\u00a0\u00a0 Update to Security Note released on December 2022 Patch Day: Privilege escalation vulnerability in SAP Business Planning and Consolidation<\/strong><\/p>\n<p>En algunos roles est\u00e1ndar de SAP en SAP Business Planning and Consolidation, se utiliza un c\u00f3digo de transacci\u00f3n reservado para el cliente. Al implementar dicho c\u00f3digo de transacci\u00f3n, un usuario malintencionado puede ejecutar una funcionalidad de transacci\u00f3n no autorizada. En circunstancias espec\u00edficas, un ataque exitoso podr\u00eda permitir que el atacante aumente sus privilegios para poder leer, cambiar o eliminar datos del sistema.<\/p>\n<p>Para resolver esta vulnerabilidad, debemos seguir los pasos manuales especificados en la nota 3271091, o aplicar una actualizaci\u00f3n al menos hasta el nivel de SP indicado en la misma nota.<\/p>\n<p><strong>3256787 \u2013 [CVE-2023-24530]\u00a0\u00a0\u00a0\u00a0\u00a0 Unrestricted Upload of File in SAP BusinessObjects Business Intelligence Platform (CMC)<\/strong><\/p>\n<p>SAP BusinessObjects Business Intelligence Platform (CMC) permite que un usuario administrador autenticado cargue c\u00f3digo malicioso que la aplicaci\u00f3n puede ejecutar a trav\u00e9s de la red. En caso de explotar con \u00e9xito la vulnerabilidad, el atacante puede realizar operaciones que pueden comprometer completamente la aplicaci\u00f3n causando un alto impacto en la confidencialidad, integridad y disponibilidad de la aplicaci\u00f3n.<\/p>\n<p>Para resolver esta vulnerabilidad debemos actualizar al menos hasta el nivel de SP indicado en la nota 3256787, aunque para disponer de una soluci\u00f3n m\u00e1s inmediata tambi\u00e9n podemos seguir los pasos del workaround indicado en la misma nota.<\/p>\n<p><strong>En la siguiente tabla vemos todas las notas liberadas este mes para comprobar si aplican o no en vuestros sistemas:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td><strong>Note<\/strong><\/td>\n<td><strong>CVE<\/strong><\/td>\n<td><strong>Title<\/strong><\/td>\n<td><strong>Priority<\/strong><\/td>\n<td><strong>CVSS<\/strong><\/td>\n<\/tr>\n<tr>\n<td>2622660<\/td>\n<td>\u00a0<\/td>\n<td>Update to Security Note released on April 2018 Patch Day:Security updates for the browser control Google Chromium delivered with SAP Business Client<\/td>\n<td>Hot News<\/td>\n<td>10.0<\/td>\n<\/tr>\n<tr>\n<td>3285757<\/td>\n<td>[CVE-2023-24523]<\/td>\n<td>Privilege Escalation vulnerability in SAP Start Service<\/td>\n<td>High<\/td>\n<td>8.8<\/td>\n<\/tr>\n<tr>\n<td>3268172<\/td>\n<td>[CVE-2022-41264]<\/td>\n<td>Update to Security Note released on December 2022 Patch Day: Code Injection vulnerability in SAP BASIS<\/td>\n<td>High<\/td>\n<td>8.8<\/td>\n<\/tr>\n<tr>\n<td>3263135<\/td>\n<td>[CVE-2023-0020]<\/td>\n<td>Information disclosure vulnerability in SAP BusinessObjects Business Intelligence platform<\/td>\n<td>High<\/td>\n<td>8.5<\/td>\n<\/tr>\n<tr>\n<td>3271091<\/td>\n<td>[CVE-2022-41268]<\/td>\n<td>Update to Security Note released on December 2022 Patch Day: Privilege escalation vulnerability in SAP Business Planning and Consolidation<\/td>\n<td>High<\/td>\n<td>8.5<\/td>\n<\/tr>\n<tr>\n<td>3256787<\/td>\n<td>[CVE-2023-24530]<\/td>\n<td>Unrestricted Upload of File in SAP BusinessObjects Business Intelligence Platform (CMC)<\/td>\n<td>High<\/td>\n<td>8.4<\/td>\n<\/tr>\n<tr>\n<td>3265846<\/td>\n<td>[CVE-2023-0024]<\/td>\n<td>Cross Site Scripting in SAP Solution Manager (BSP Application)<\/td>\n<td>Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td>3267442<\/td>\n<td>[CVE-2023-0025]<\/td>\n<td>Cross Site Scripting in SAP Solution Manager (BSP Application)<\/td>\n<td>Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td>3270509<\/td>\n<td>[CVE-2023-23855]<\/td>\n<td>URL Redirection vulnerability in SAP Solution Manager<\/td>\n<td>Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td>3281724<\/td>\n<td>[CVE-2023-0019]<\/td>\n<td>Missing Authorization check in GRC function modules<\/td>\n<td>Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td>3290901<\/td>\n<td>[CVE-2023-24528]<\/td>\n<td>Missing Authorization Check in SAP Fiori apps for Travel Management in SAP ERP (My Travel Requests)<\/td>\n<td>Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td>2985905<\/td>\n<td>[CVE-2023-24524]<\/td>\n<td>Missing Authorization check in SAP S\/4 HANA Map Treasury Correspondence Format Data<\/td>\n<td>Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td>3266751<\/td>\n<td>[CVE-2023-23852]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP Solution Manager 7.2<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>3268959<\/td>\n<td>[Multiple CVEs]<\/td>\n<td>Multiple vulnerabilities in SAP NetWeaver AS for ABAP and ABAP Platform CVEs \u2013 CVE-2023-23859 , CVE-2023-23860<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>3271227<\/td>\n<td>[CVE-2023-23853]<\/td>\n<td>URL Redirection vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>3282663<\/td>\n<td>[CVE-2023-24529]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (Business Server Pages application)<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>3293786<\/td>\n<td>[CVE-2023-23858]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>3262544<\/td>\n<td>[CVE-2022-41262]<\/td>\n<td>Update to Security Note released on December 2022 Patch Day: Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS for Java (Http Provider Service)<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>3274585<\/td>\n<td>[CVE-2023-25614]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework)<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>3269151<\/td>\n<td>[CVE-2023-24521]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework)<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>3269118<\/td>\n<td>[CVE-2023-24522]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework)<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>3283283<\/td>\n<td>[CVE-2023-0013]<\/td>\n<td>Update to Security Note released on January 2023 Patch Day: Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>3275841<\/td>\n<td>[CVE-2023-23851]<\/td>\n<td>Unrestricted File Upload in SAP Business Planning and Consolidation<\/td>\n<td>Medium<\/td>\n<td>5.4<\/td>\n<\/tr>\n<tr>\n<td>3263863<\/td>\n<td>[CVE-2023-23856]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in Web Intelligence Interface<\/td>\n<td>Medium<\/td>\n<td>4.3<\/td>\n<\/tr>\n<tr>\n<td>2788178<\/td>\n<td>[CVE-2023-24525]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP CRM WebClient UI<\/td>\n<td>Medium<\/td>\n<td>4.3<\/td>\n<\/tr>\n<tr>\n<td>3287291<\/td>\n<td>[CVE-2023-23854]<\/td>\n<td>Missing Authorization check in SAP NetWeaver AS ABAP and ABAP Platform<\/td>\n<td>Medium<\/td>\n<td>3.8<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>Este mes SAP ha liberado 12 notas de seguridad de las cuales 7 tienen una puntuaci\u00f3n CVSS por encima de 9.<\/p>\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td><strong>LOW<\/strong><\/td>\n<td><strong>MEDIUM<\/strong><\/td>\n<td><strong>HIGH<\/strong><\/td>\n<td><strong>HOT NEWS<\/strong><\/td>\n<td><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Febrero<\/td>\n<td>0<\/td>\n<td>20<\/td>\n<td>5<\/td>\n<td>1<\/td>\n<td><strong>26<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Enero<\/td>\n<td>0<\/td>\n<td>5<\/td>\n<td>0<\/td>\n<td>5<\/td>\n<td><strong>12<\/strong><\/td>\n<\/tr>\n<tr>\n<td>TOTAL<\/td>\n<td><strong>0<\/strong><\/td>\n<td><strong>25<\/strong><\/td>\n<td><strong>5<\/strong><\/td>\n<td><strong>6<\/strong><\/td>\n<td><strong>38<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>El desglose de vulnerabilidades encontradas en los sistemas SAP ha sido el siguiente:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td><strong>Enero<\/strong><\/td>\n<td><strong>Febrero<\/strong><\/td>\n<td><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Clickjacking<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Code Injection<\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td><strong>3<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Cross-Site Scripting<\/td>\n<td>3<\/td>\n<td>12<\/td>\n<td><strong>15<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Denial of Service<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Improper authentication<\/td>\n<td>4<\/td>\n<td>4<\/td>\n<td><strong>8<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Improper input validation<\/td>\n<td>1<\/td>\n<td>3<\/td>\n<td><strong>4<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Information Disclosure<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Memory corruption<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing Authorization Check<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing input Validation<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing XML Validation<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Remote Code Execution<\/td>\n<td>2<\/td>\n<td>\u00a0<\/td>\n<td><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Server Side Request Forgery<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>SQL Injection<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Otros<\/td>\n<td>2<\/td>\n<td>6<\/td>\n<td><strong>8<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td><strong>16<\/strong><\/td>\n<td><strong>28<\/strong><\/td>\n<td><strong>44<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>La diferencia de notas liberadas y vulnerabilidades es debido a que una nota puede solucionar m\u00faltiples vulnerabilidades.<\/p>\n<p>Nos despedimos recomendando pasarse por el apartado de\u00a0<strong>security notes<\/strong>\u00a0del Launchpad de SAP y analizar las notas liberadas desde la \u00faltima actualizaci\u00f3n de nuestros sistemas e instalar las que apliquen a los sistemas de cada empresa.<\/p>\n<p>Art\u00edculos anteriores de este mismo a\u00f1o 2023:<\/p>\n<p><a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-enero-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">ENERO 2023<\/a><\/p>\n<p><strong>Fuentes:<\/strong><\/p>\n<p><a href=\"https:\/\/wiki.scn.sap.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/wiki.scn.sap.com\/<\/a><\/p>\n<p><a href=\"https:\/\/launchpad.support.sap.com\/#\/securitynotes\" target=\"_blank\" rel=\"noopener\">https:\/\/launchpad.support.sap.com\/#\/securitynotes<\/a><\/p>\n<p><a href=\"https:\/\/www.sap.com\/documents\/2022\/02\/fa865ea4-167e-0010-bca6-c68f7e60039b.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.sap.com\/documents\/2022\/02\/fa865ea4-167e-0010-bca6-c68f7e60039b.html<\/a><\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;M\u00e1s informaci\u00f3n&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"morado\">M\u00e1s informaci\u00f3n:<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/orekait.com\/es\/area-administracion-sistemas&#8221; button_text=&#8221;M\u00e1s informaci\u00f3n&#8221; module_class=&#8221;entrada-btn&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#8156EA&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_color=&#8221;#8156EA&#8221; button_border_radius=&#8221;30px&#8221; button_font=&#8221;Plus Jakarta Sans|600|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#8156EA&#8221; button_on_hover=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#8156EA&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#8156EA&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221; url_new_window=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; admin_label=&#8221;Noticias relacionadas titulo&#8221; module_id=&#8221;fondo-articulos&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_heading title=&#8221;Quizas te pueda interesar&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Noticias relacionadas&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-150px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;current&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2023\/06\/desviaciones-de-produccion-400&#215;402-1.png&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2023\/05\/sistemas-hosting.png&#8221; title_text=&#8221;sistemas-hosting&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Continuando con nuestro empe\u00f1o en divulgar las \u00faltimas actualizaciones de seguridad SAP disponibles, traemos un nuevo post con el resumen del Security Patch Day de febrero, en este post analizamos las \u00faltimas notas de seguridad liberadas por SAP y las explicamos de la manera m\u00e1s sencilla posible. Nuevamente la nota destacada por SAP es la\u00a02622660\u00a0ya [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3678,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Lorem ipsum dolor sit amet consectetur adipiscing elit congue montes, imperdiet taciti erat elementum fermentum sem ante ultrices ridiculus, sagittis sociis egestas quisque ac semper quis odio. Aenean hendrerit ac metus dis nascetur aliquet mollis integer, rutrum vel laoreet posuere proin sagittis luctus est, tempus duis nisl ultrices parturient tempor praesent. Dignissim curabitur nascetur pellentesque augue fringilla pulvinar eros, tempus fames vehicula maecenas cubilia id, rutrum euismod integer ut scelerisque mus.\r\n\r\nVivamus auctor odio aenean rhoncus natoque dictum purus, volutpat pellentesque laoreet ridiculus consequat nisi varius euismod, augue platea convallis curae magnis taciti. Imperdiet nibh curabitur quisque orci consequat aenean pellentesque, cubilia duis senectus felis sed posuere tortor, magnis enim diam a odio sociis. Enim tellus nisl nec molestie augue luctus tempor habitant, nunc dictumst phasellus volutpat sem facilisis taciti, habitasse laoreet at turpis vel fermentum vulputate.","_et_gb_content_width":"","footnotes":""},"categories":[48,57,50],"tags":[],"class_list":["post-3674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-administracion-de-sistemas","category-sap-netweaver","category-sap-security-patch-day"],"_links":{"self":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/3674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/comments?post=3674"}],"version-history":[{"count":6,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/3674\/revisions"}],"predecessor-version":[{"id":20898,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/3674\/revisions\/20898"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media\/3678"}],"wp:attachment":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media?parent=3674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/categories?post=3674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/tags?post=3674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}