Vulnerabilities

SAP Patches Critical Vulnerabilities in Diagnostics Agent, BusinessObjects

Two critical vulnerabilities in SAP Diagnostics Agent allow attackers to execute malicious commands on all monitored systems.

Two critical vulnerabilities in SAP Diagnostics Agent allow attackers to execute malicious commands on all monitored systems.

German enterprise software maker SAP announced the release of 19 new notes on its April 2023 Security Patch Day, as well as five updates to previously released notes.

Of the 24 notes included in SAP’s security updates (PDF), five are rated ‘hot news’, the highest severity rating. Two of these are new notes and three are updates to previously released security notes.

The most important of the new notes deals with two critical vulnerabilities in SAP Diagnostics Agent that could be exploited to execute commands on all monitored SAP systems. The bugs are tracked as CVE-2023-27497 (CVSS score of 10) and CVE-2023-27267 (CVSS score of 9).

Designed to connect the SAP solutions manager to managed systems, the Diagnostics Agent collects information for reporting purposes.

The two critical vulnerabilities addressed this week were identified in the OSCommandBridge and the EventLogService Collector components and can be exploited without authentication to execute scripts on all connected Diagnostics Agents.

“In conjunction with insufficient input validation, attackers were able to execute malicious commands on all monitored SAP systems, highly impacting their confidentiality, integrity, and availability,” enterprise application security company Onapsis explains.

The second new hot news note released on SAP’s April 2023 Security Patch Day addresses a critical information disclosure flaw (CVE-2023-28765, CVSS score of 9.8) in the BusinessObjects platform.

Due to missing password protection enforcement, an attacker with basic privileges can access the lcmbiar file, which could allow them to access user passwords.

Advertisement. Scroll to continue reading.

“Depending on the authorizations of the impersonated user, an attacker could completely compromise the system’s confidentiality, integrity, and availability,” Onapsis notes.

This week, SAP also released updates for the Chromium browser in Business Client and updated two hot news security notes dealing with an improper access control issue and with a directory traversal vulnerability in NetWeaver.

SAP released only one high priority note this week, to address CVE-2023-29186, a directory traversal bug in NetWeaver’s BI_CONT AddOn component.

“A report of the AddOn allows a remote attacker with administrative privileges to overwrite arbitrary and potentially critical OS files. This could make the affected system completely unavailable. The patch completely disables the vulnerable report,” Onapsis explains.

The remaining notes released on SAP’s Security Patch Day address medium- and low-severity vulnerabilities in Landscape Management, SapSetup, NetWeaver, Fiori, GUI for HTML, CRM, SAP Web Dispatcher and Internet Communication Manager, ABAP Platform, Commerce, and Application Interface Framework.

Related: SAP Releases Five ‘Hot News’ Notes on March 2023 Patch Day

Related: SAP’s February 2023 Security Updates Patch High-Severity Vulnerabilities

Related: SAP’s First Security Updates for 2023 Resolve Critical Vulnerabilities

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version