{"id":5476,"date":"2022-07-15T08:00:31","date_gmt":"2022-07-15T06:00:31","guid":{"rendered":"http:\/\/192.168.20.3\/?p=5476"},"modified":"2024-12-10T13:33:16","modified_gmt":"2024-12-10T12:33:16","slug":"sap-security-patch-day-julio-2022","status":"publish","type":"post","link":"https:\/\/orekait.com\/es\/sap-security-patch-day-julio-2022\/","title":{"rendered":"SAP Security Patch Day<br> <span class=\"font-300\">Julio 2022<\/span>"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Imagen principal&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2022\/07\/Sap-Security-Patch-Day-blog.png&#8221; alt=&#8221;cloud-public&#8221; title_text=&#8221;Sap-Security-Patch-Day-blog&#8221; admin_label=&#8221;Imagen principal&#8221; module_class=&#8221;post-img&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Cuerpo&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.25.2&#8243; header_2_font_size=&#8221;24px&#8221; header_3_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; content__hover_enabled=&#8221;off|desktop&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"et_pb_row et_pb_row_0\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Con precisi\u00f3n alemana, SAP ha publicado desde 2018, el segundo martes de cada mes una entrada en su blog con el security patch day. Ahora para consultar las notas de seguridad publicadas debemos utilizar la aplicaci\u00f3n de\u00a0<a href=\"https:\/\/launchpad.support.sap.com\/#\/securitynotes\" target=\"_blank\" rel=\"noopener\">security notes del launchpad<\/a>, o acceder a un documento que SAP publica\u00a0<a href=\"https:\/\/www.sap.com\/documents\/2022\/02\/fa865ea4-167e-0010-bca6-c68f7e60039b.html\" target=\"_blank\" rel=\"noopener\">aqu\u00ed<\/a>.<\/p>\n<p>Desde Oreka IT seguimos considerando importante continuar con la divulgaci\u00f3n de estas actualizaciones ya que entendemos que es la mejor forma de explicar la criticidad de mantener actualizadas las aplicaciones corporativas.<\/p>\n<p>Comenzando con el an\u00e1lisis cuantitativo, desde el \u00faltimo\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-junio\/\">security patch day de junio<\/a>\u00a0SAP ha publicado 26 notas de seguridad, de las cuales 4 son de importancia high, este mes no hay ninguna nota de seguridad calificada como Hot new.<\/p>\n<p>Tras revisar las notas publicadas en este security patch day, vemos que las m\u00e1s cr\u00edticas se enfocan en Sap Business One y se pueden resolver actualizando a la \u00faltima versi\u00f3n 10.0 FP2202. Estas vulnerabilidades nos recuerdan la importancia de mantener nuestras aplicaciones corporativas actualizadas.<\/p>\n<p><strong>A continuaci\u00f3n, analizaremos estas 4 notas:<\/strong><\/p>\n<p><strong>Information disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Central management console)<\/strong><\/p>\n<p>Vulnerabilidad en SAP Business Objects CMC que permite a un atacante no autenticado obtener informaci\u00f3n a trav\u00e9s de la red, informaci\u00f3n que deber\u00eda estar restringida. Para que esta vulnerabilidad sea posible es necesario que un usuario leg\u00edtimo acceda a la aplicaci\u00f3n y est\u00e9 localmente comprometido, por ejemplo, mediante la t\u00e9cnica del sniffing o ingenier\u00eda social. En caso de conseguirlo el atacante puede comprometer la seguridad de la aplicaci\u00f3n.<\/p>\n<p>SAP ha documentado esta vulnerabilidad en la nota 3221288, en la que nos indica que esta vulnerabilidad est\u00e1 solventada desde las versiones 4.2 SP09 Patch 9 y 4.3 SP01. Versiones que SAP ha publicado recientemente.<\/p>\n<p>Una vez m\u00e1s, cabe remarcar la importancia de mantener actualizadas las aplicaciones y de seguir un plan de mantenimiento que nos permita anticiparnos a estas vulnerabilidades.<\/p>\n<p><strong>[CVE-2022-32249]<\/strong>\u00a0<strong>Information Disclosure vulnerability in SAP Business One<\/strong><\/p>\n<p><strong>\u00a0<\/strong>Vulnerabilidad en SAP Business One cuando este se integra con SAP HANA. Un atacante podr\u00eda vulnerar la HANA Cockpit data volume para conseguir acceso a informaci\u00f3n altamente sensible c\u00f3mo credenciales de cuenta con privilegios.<\/p>\n<p>Seg\u00fan la informaci\u00f3n publicada en la nota 3212997, existe un workaround parcial que \u00fanicamente solventa la vulnerabilidad para el protocolo FTP. SAP insiste en la necesidad de actualizar a la \u00faltima versi\u00f3n de SAP Business One 10.0 FP2202 que resuelve esta vulnerabilidad.<strong>\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>[CVE-2022-28771]<\/strong>\u00a0<strong>Missing Authentication check in SAP Business One (License service API)<\/strong><\/p>\n<p>En la nota 3157613 SAP documenta la informaci\u00f3n de esta vulnerabilidad por la que un atacante sin autenticar puede enviar peticiones HTTP maliciosas sobre la red y en caso de lograr explotar la vulnerabilidad podr\u00eda afectar al funcionamiento de la aplicaci\u00f3n pudiendo provocar una indisponibilidad de la aplicaci\u00f3n.<\/p>\n<p>SAP proporciona el workaround descrito en la nota 3189816, pero insiste en que la soluci\u00f3n permanente y recomendada es actualizar a la \u00faltima versi\u00f3n disponible de SAP Business One 10.0 FP2202.<\/p>\n<p><strong>[CVE-2022-31593] Code Injection vulnerability in SAP Business One<\/strong><\/p>\n<p>Vulnerabilidad en la que un atacante con pocos privilegios puede realizar una inyecci\u00f3n de c\u00f3digo que puede ser ejecutado por Sap Business One. Pudiendo llegar a obtener control sobre el funcionamiento de la aplicaci\u00f3n.<\/p>\n<p><strong><em>La vulnerabilidad afecta principalmente al cliente B1, que puede ejecutar otros ficheros ejecutables.<\/em><\/strong><\/p>\n<p><strong>Actualmente los usuarios pueden subir ficheros desde el cliente B1 y ejecutarlos en la aplicaci\u00f3n, con la nueva versi\u00f3n\u00a0<\/strong>SAP Business One 10.0 FP2202 se a\u00f1ade la funcionalidad de aplicar un filtro por tipo de fichero para evitar que se suban ficheros con demasiado riesgo.<\/p>\n<p>Por lo tanto, para disponer de una soluci\u00f3n a esta vulnerabilidad es necesario actualizar a la \u00faltima versi\u00f3n disponible.<\/p>\n<p><strong>En el siguiente cuadro, todas las notas liberadas este mes para comprobar si aplican o no en vuestros sistemas:<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"et_pb_row et_pb_row_1\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>&nbsp;<\/p>\n<table border=\"1\">\n<tbody>\n<tr>\n<td>Note<\/td>\n<td>CVE<\/td>\n<td>Description<\/td>\n<td>Component<\/td>\n<td>Priority<\/td>\n<td>CVSS<\/td>\n<\/tr>\n<tr>\n<td width=\"61\"><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3221288\" target=\"_blank\" rel=\"noopener\">3221288<\/a><\/td>\n<td>[CVE-2022-35228]<\/td>\n<td>Information disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Central management console)<\/td>\n<td>BI-BIP-CMC<\/td>\n<td>8,3<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3212997\" target=\"_blank\" rel=\"noopener\">3212997<\/a><\/td>\n<td>[CVE-2022-32249]<\/td>\n<td>Information Disclosure vulnerability in SAP Business One<\/td>\n<td>SBO-CRO-SEC<\/td>\n<td>7,6<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3157613\" target=\"_blank\" rel=\"noopener\">3157613<\/a><\/td>\n<td>[CVE-2022-28771]<\/td>\n<td>Authentication check in SAP Business One (License service API)<\/td>\n<td>SBO-CRO-SEC<\/td>\n<td>7,5<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3191012\" target=\"_blank\" rel=\"noopener\">3191012<\/a><\/td>\n<td>[CVE-2022-31593]<\/td>\n<td>Code Injection vulnerability in SAP Business One<\/td>\n<td>SBO-CRO-SEC<\/td>\n<td>7,4<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3147498\" target=\"_blank\" rel=\"noopener\">3147498<\/a><\/td>\n<td>\u00a0<\/td>\n<td width=\"378\">Improper Access Control check in SAP NetWeaver basicadmin and adminadapter services<\/td>\n<td>BC-JAS-ADM-ADM<\/td>\n<td>7,4<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3169239\" target=\"_blank\" rel=\"noopener\">3169239<\/a><\/td>\n<td>[CVE-2022-29619]<\/td>\n<td>Information Disclosure to user Administrator in SAP BusinessObjects Business Intelligence Platform 4.x<\/td>\n<td>BI-BIP-ADM<\/td>\n<td>6,5<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3142092\" target=\"_blank\" rel=\"noopener\">3142092<\/a><\/td>\n<td>[CVE-2022-22542]<\/td>\n<td>Information Disclosure vulnerability in SAP S\/4HANA (Supplier Factsheet and Enterprise Search for Business Partner, Supplier and Customer)<\/td>\n<td>LO-MD-BP<\/td>\n<td>6,5<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3165801\" target=\"_blank\" rel=\"noopener\">3165801<\/a><\/td>\n<td>[CVE-2022-29611]<\/td>\n<td>Missing Authorization check in SAP NetWeaver Application Server for ABAP and ABAP Platform<\/td>\n<td>BC-ABA-LI<\/td>\n<td>6,5<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/2726124\" target=\"_blank\" rel=\"noopener\">2726124<\/a><\/td>\n<td>\u00a0<\/td>\n<td>Missing Authorization Check in multiple components under SAP Automotive Solutions<\/td>\n<td>IS-A<\/td>\n<td>6,3<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3211760\" target=\"_blank\" rel=\"noopener\">3211760<\/a><\/td>\n<td>[CVE-2022-35227]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NW EP WPC<\/td>\n<td>EP-PIN-WPC<\/td>\n<td>6,1<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3210779\" target=\"_blank\" rel=\"noopener\">3210779<\/a><\/td>\n<td>[CVE-2022-35224]<\/td>\n<td class=\"xl6823163\" width=\"910\">Cross-Site Scripting (XSS) vulnerability in SAP Enterprise Portal<\/td>\n<td>EP-PIN-GPA<\/td>\n<td>6,1<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3209557\" target=\"_blank\" rel=\"noopener\">3209557<\/a><\/td>\n<td>[CVE-2022-32247]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal<\/td>\n<td>EP-PIN-TOL<\/td>\n<td>6,1<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3208880\" target=\"_blank\" rel=\"noopener\">3208880<\/a><\/td>\n<td>[CVE-2022-35225]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal<\/td>\n<td>EP-PIN-PRT<\/td>\n<td>6,1<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3208819\" target=\"_blank\" rel=\"noopener\">3208819<\/a><\/td>\n<td>[CVE-2022-35170]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal<\/td>\n<td>EP-PIN-AI<\/td>\n<td>6,1<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3207902\" target=\"_blank\" rel=\"noopener\">3207902<\/a><\/td>\n<td>[CVE-2022-35172]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal<\/td>\n<td>EP-PIN-URL<\/td>\n<td>6,1<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3194361\" target=\"_blank\" rel=\"noopener\">3194361<\/a><\/td>\n<td>[CVE-2022-35169]<\/td>\n<td>Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (LCM)<\/td>\n<td>BI-BIP-SRV<\/td>\n<td>6<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3167430\" target=\"_blank\" rel=\"noopener\">3167430<\/a><\/td>\n<td>[CVE-2022-31591]<\/td>\n<td>Privilege Escalation vulnerability in SAP BusinessObjects (BW Publisher Service)<\/td>\n<td>BI-BIP-IK-PAR-SAP<\/td>\n<td>5,6<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3213826\" target=\"_blank\" rel=\"noopener\">3213826<\/a><\/td>\n<td>[CVE-2022-31597]<\/td>\n<td>Missing Authorization check in SAP S\/4HANA(business partner extension for Spain\/Slovakia)<\/td>\n<td>FI-LOC-FI-ES<\/td>\n<td>5,4<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3213279\" target=\"_blank\" rel=\"noopener\">3213279<\/a><\/td>\n<td>[CVE-2022-31598]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP Business Objects<\/td>\n<td>BI-BIP-CMC<\/td>\n<td>5,4<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3203079\" target=\"_blank\" rel=\"noopener\">3203079<\/a><\/td>\n<td>[CVE-2022-32246]<\/td>\n<td>SQL Injection vulnerability in SAP BusinessObjects Business Intelligence Platform (Visual Difference Application)<\/td>\n<td>BI-BIP-VD<\/td>\n<td>5,4<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3150454\" target=\"_blank\" rel=\"noopener\">3150454<\/a><\/td>\n<td>\u00a0<\/td>\n<td>Information Disclosure vulnerability in SAP NetWeaver Application Server ABAP and ABAP Platform<\/td>\n<td>BC-MID-RFC<\/td>\n<td>4,9<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3150463\" target=\"_blank\" rel=\"noopener\">3150463<\/a><\/td>\n<td>\u00a0<\/td>\n<td>Information Disclosure vulnerability in ABAP Platform<\/td>\n<td>BC-MID-RFC<\/td>\n<td>4,9<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3216161\" target=\"_blank\" rel=\"noopener\">3216161<\/a><\/td>\n<td>[CVE-2022-32248]<\/td>\n<td>Missing Input Validation in Manage Checkbooks component of SAP S\/4HANA<\/td>\n<td>FI-FIO-AP<\/td>\n<td>4,3<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3211203\" target=\"_blank\" rel=\"noopener\">3211203<\/a><\/td>\n<td>[CVE-2022-35168]<\/td>\n<td>Denial of Service vulnerability in SAP Business One<\/td>\n<td>SBO-CRO-SEC<\/td>\n<td>4,3<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3196280\" target=\"_blank\" rel=\"noopener\">3196280<\/a><\/td>\n<td>[CVE-2022-31592]<\/td>\n<td>Missing Authorization check in EA-DFPS<\/td>\n<td>IS-DFS-MM<\/td>\n<td>4,3<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3220746\" target=\"_blank\" rel=\"noopener\">3220746<\/a><\/td>\n<td>[CVE-2022-35171]<\/td>\n<td>Improper Input Validation in SAP 3D Visual Enterprise Viewer<\/td>\n<td>CA-VE-VEV<\/td>\n<td>3,3<\/td>\n<td>Low<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"et_pb_row et_pb_row_2\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Este mes SAP ha liberado 26 notas de seguridad de las cuales ninguna tiene una puntuaci\u00f3n CVSS por encima de 9.\u00a0<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<table border=\"1\">\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td>LOW<\/td>\n<td>MEDIUM<\/td>\n<td>HIGH<\/td>\n<td>HOT NEWS<\/td>\n<td>TOTAL<\/td>\n<\/tr>\n<tr>\n<td>Enero<\/td>\n<td>1<\/td>\n<td>5<\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td><strong>9<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Febrero<\/td>\n<td>1<\/td>\n<td>6<\/td>\n<td>3<\/td>\n<td>9<\/td>\n<td><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Marzo<\/td>\n<td>1<\/td>\n<td>10<\/td>\n<td>1<\/td>\n<td>4<\/td>\n<td><strong>16<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Abril<\/td>\n<td>2<\/td>\n<td>17<\/td>\n<td>7<\/td>\n<td>7<\/td>\n<td><strong>33<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Mayo<\/td>\n<td>\u00a0<\/td>\n<td>8<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td><strong>14<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Junio<\/td>\n<td>2<\/td>\n<td>7<\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td><strong>12<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Julio<\/td>\n<td width=\"91\">1<\/td>\n<td width=\"91\">20<\/td>\n<td width=\"91\">5<\/td>\n<td width=\"99\">\u00a0<\/td>\n<td width=\"91\"><strong>26<\/strong><\/td>\n<\/tr>\n<tr>\n<td>TOTAL<\/td>\n<td><strong>7<\/strong><\/td>\n<td><strong>53<\/strong><\/td>\n<td><strong>17<\/strong><\/td>\n<td><strong>26<\/strong><\/td>\n<td><strong>103<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"et_pb_row et_pb_row_3\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>El desglose de vulnerabilidades encontradas en los sistemas SAP ha sido el siguiente:<\/strong>\u00a0<\/p>\n<p>&nbsp;<\/p>\n<table border=\"1\">\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td>Enero<\/td>\n<td>Febrero<\/td>\n<td>Marzo<\/td>\n<td>Abril<\/td>\n<td>Mayo<\/td>\n<td>Junio<\/td>\n<td>Julio<\/td>\n<td>TOTAL<\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Clickjacking<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td>Code Injection<\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>3<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>2<\/td>\n<td><strong>9<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Cross-Site Scripting<\/td>\n<td>2<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td>4<\/td>\n<td>3<\/td>\n<td>1<\/td>\n<td>7<\/td>\n<td><strong>23<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Denial of Service<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>2<\/td>\n<td><strong>9<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Improper authentication<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Improper input validation<\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>2<\/td>\n<td><strong>7<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Information Disclosure<\/td>\n<td>4<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td>6<\/td>\n<td>4<\/td>\n<td>1<\/td>\n<td>7<\/td>\n<td><strong>28<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Memory corruption<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Missing Authorization Check<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td>5<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td>6<\/td>\n<td><strong>16<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Missing input Validation<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Missing XML Validation<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>3<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>3<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Remote Code Execution<\/td>\n<td>1<\/td>\n<td>7<\/td>\n<td>1<\/td>\n<td>6<\/td>\n<td>4<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td><strong>20<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Server Side Request Forgery<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>2<\/td>\n<td>\u00a0<\/td>\n<td><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">SQL Injection<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Otros<\/td>\n<td>\u00a0<\/td>\n<td>2<\/td>\n<td>\u00a0<\/td>\n<td>6<\/td>\n<td>1<\/td>\n<td>6<\/td>\n<td>1<\/td>\n<td><strong>16<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td><strong>12<\/strong><\/td>\n<td><strong>19<\/strong><\/td>\n<td><strong>16<\/strong><\/td>\n<td><strong>36<\/strong><\/td>\n<td><strong>14<\/strong><\/td>\n<td><strong>15\u00a0<\/strong><\/td>\n<td><strong>28<\/strong><\/td>\n<td><strong>140<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"et_pb_row et_pb_row_4\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>La diferencia de notas liberadas y vulnerabilidades es debido a que una nota puede solucionar m\u00faltiples vulnerabilidades.\u00a0<\/p>\n<p>Nos despedimos recomendando pasarse por el apartado de\u00a0<strong>security notes<\/strong>\u00a0del Launchpad de SAP y analizar las notas liberadas desde la \u00faltima actualizaci\u00f3n de nuestros sistemas e instalar las que apliquen a los sistemas de cada empresa.<\/p>\n<p><strong>Fuentes:<\/strong><\/p>\n<p><a href=\"https:\/\/wiki.scn.sap.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/wiki.scn.sap.com\/<\/a><\/p>\n<p><a href=\"https:\/\/launchpad.support.sap.com\/#\/securitynotes\" target=\"_blank\" rel=\"noopener\">https:\/\/launchpad.support.sap.com\/#\/securitynotes<\/a><\/p>\n<p><a href=\"https:\/\/www.sap.com\/documents\/2022\/02\/fa865ea4-167e-0010-bca6-c68f7e60039b.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.sap.com\/documents\/2022\/02\/fa865ea4-167e-0010-bca6-c68f7e60039b.html<\/a><\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Art\u00edculos anteriores de este mismo a\u00f1o 2022:\u00a0<\/p>\n<p><a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-junio\/\">JUNIO 2022<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-mayo\/\" target=\"_blank\" rel=\"noopener\">MAYO 2022<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-abril\/\" target=\"_blank\" rel=\"noopener\">ABRIL 2022<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-marzo\/\" target=\"_blank\" rel=\"noopener\">MARZO 2022<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-febrero\/\" target=\"_blank\" rel=\"noopener\">FEBRERO 2022<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;M\u00e1s informaci\u00f3n&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"morado\">M\u00e1s informaci\u00f3n:<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/orekait.com\/es\/area-administracion-sistemas&#8221; button_text=&#8221;M\u00e1s informaci\u00f3n&#8221; module_class=&#8221;entrada-btn&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#8156EA&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_color=&#8221;#8156EA&#8221; button_border_radius=&#8221;30px&#8221; button_font=&#8221;Plus Jakarta Sans|600|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#8156EA&#8221; button_on_hover=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#8156EA&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#8156EA&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221; url_new_window=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; admin_label=&#8221;Noticias relacionadas titulo&#8221; module_id=&#8221;fondo-articulos&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_heading title=&#8221;Quizas te pueda interesar&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Noticias relacionadas&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-150px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;current&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Con precisi\u00f3n alemana, SAP ha publicado desde 2018, el segundo martes de cada mes una entrada en su blog con el security patch day. Ahora para consultar las notas de seguridad publicadas debemos utilizar la aplicaci\u00f3n de\u00a0security notes del launchpad, o acceder a un documento que SAP publica\u00a0aqu\u00ed. Desde Oreka IT seguimos considerando importante continuar [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5478,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Lorem ipsum dolor sit amet consectetur adipiscing elit congue montes, imperdiet taciti erat elementum fermentum sem ante ultrices ridiculus, sagittis sociis egestas quisque ac semper quis odio. Aenean hendrerit ac metus dis nascetur aliquet mollis integer, rutrum vel laoreet posuere proin sagittis luctus est, tempus duis nisl ultrices parturient tempor praesent. Dignissim curabitur nascetur pellentesque augue fringilla pulvinar eros, tempus fames vehicula maecenas cubilia id, rutrum euismod integer ut scelerisque mus.\r\n\r\nVivamus auctor odio aenean rhoncus natoque dictum purus, volutpat pellentesque laoreet ridiculus consequat nisi varius euismod, augue platea convallis curae magnis taciti. Imperdiet nibh curabitur quisque orci consequat aenean pellentesque, cubilia duis senectus felis sed posuere tortor, magnis enim diam a odio sociis. Enim tellus nisl nec molestie augue luctus tempor habitant, nunc dictumst phasellus volutpat sem facilisis taciti, habitasse laoreet at turpis vel fermentum vulputate.","_et_gb_content_width":"","footnotes":""},"categories":[48,49,50],"tags":[],"class_list":["post-5476","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-administracion-de-sistemas","category-sap-security","category-sap-security-patch-day"],"_links":{"self":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/5476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/comments?post=5476"}],"version-history":[{"count":5,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/5476\/revisions"}],"predecessor-version":[{"id":21195,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/5476\/revisions\/21195"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media\/5478"}],"wp:attachment":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media?parent=5476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/categories?post=5476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/tags?post=5476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}