Security Experts:

Connect with us

Hi, what are you looking for?



SAP Releases 10 Security Notes on July 2020 Patch Day

SAP released eight new Security Notes on its July 2020 Patch Day, but also included two updates to previous Patch Day Security Notes.

SAP released eight new Security Notes on its July 2020 Patch Day, but also included two updates to previous Patch Day Security Notes.

The most important of the Notes addresses multiple vulnerabilities in NetWeaver AS JAVA (LM Configuration Wizard). Rated Hot News priority (CVSS score of 10), the Note patches CVE-2020-6287 and CVE-2020-6286, two vulnerabilities that could allow attackers to take over vulnerable systems.

The most severe of these is CVE-2020-6287, which is also referred to as RECON (Remotely Exploitable Code On NetWeaver). Security researchers estimate there are approximately 2,500 vulnerable systems accessible directly from the Internet and that over 40,000 SAP customers are affected.

Another Hot News Security Note included in this month’s Patch Day is an update to an April 2018 Patch Day Note, which includes patches for the Chromium browser in SAP Business Client.

Another important patch released this month addresses an information disclosure issue (CVE-2020-6285) in NetWeaver (XMLToolkit for Java). Successful exploitation of the bug could result in attackers accessing restricted arbitrary files.

Next on the list is a medium-priority Note that patches five vulnerabilities in Disclosure Management (CVE-2020-6267, CVE-2020-6289, CVE-2020-6290, CVE-2020-6291, and CVE-2020-6292).

The other Notes address cross-site scripting (XSS) flaws in Business Objects Business Intelligence Platform (CVE-2020-6281, CVE-2020-6276, and CVE-2020-6278), a server-side request forgery in NetWeaver AS JAVA (CVE-2020-6282), and information disclosure in NetWeaver (CVE-2020-6280).

SAP also released an update to a Note addressing another XSS vulnerability (CVE-2020-6222) in the BusinessObjects Business Intelligence Platform.

Onapsis, a company that specializes in securing Oracle and SAP applications, points out that 10 other SAP Security Notes could be added to this month’s list, for a total of 20 notes.

Related: ‘RECON’ Vulnerability Exposes Thousands of SAP Systems to Attacks

Related: Critical Vulnerability Patched in SAP Commerce

Related: SAP Alerts Customers of Vulnerabilities in Cloud Products

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.


GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet