Security Experts:

Connect with us

Hi, what are you looking for?



SAP Releases 6 Security Notes on January 2020 Patch Day

SAP today released 6 Security Notes and 1 Updated Note as part of its January 2020 Security Patch Day, with all addressing Medium severity vulnerabilities. 

SAP today released 6 Security Notes and 1 Updated Note as part of its January 2020 Security Patch Day, with all addressing Medium severity vulnerabilities. 

The most important of these is a Cross-Site Scripting (XSS) flaw in Rest Adapter of SAP Process Integration. The vulnerability is tracked as CVE-2020-6305 and features a CVSS score of 6.1. 

Next in line is CVE-2020-6304, a Denial of service (DoS) flaw in SAP NetWeaver Internet Communication Manager, featuring a CVSS score of 5.9, which was reported to SAP in September, says Onapsis, a firm that specializes in securing SAP and Oracle applications. 

“An attacker can send a specially crafted packet to the IIOP or P4 service in order to cause a buffer overflow and thus crashing the ICM process,” Onapsis notes

The flaw is considered Medium severity because an exploit requires that the parameter rdisp/TRACE is set to a value higher than 1, which is not part of the default configuration. However, Onapsis believes that impact on the availability of all web-based SAP applications is high. 

This month, SAP addressed three missing authorization checks, in Realtech RTCISM 100, Automated Note Search Tool (SAP_BASIS), and SAP Leasing. The last two bugs are tracked as CVE-2020-6307 and CVE-2020-6306, respectively. 

“Missing explicit authorization checks in RFC-enabled function modules is still one of the most detected vulnerabilities especially in custom code,” Onapsis reveals. 

The two other Medium severity vulnerabilities SAP patched on this month’s Patch Day are CVE-2020-6303 – improper input validation in SAP Disclosure Management (CVSS score 5.4) – and CVE-2019-0388 – content spoofing vulnerability in UI5 HTTP Handler (CVSS score 4.3). 

Five other Security Notes were released between the second Tuesday of December 2019 and the second Tuesday of January, including 1 High priority, 3 Medium priority, and 1 Low priority, Onapsis reveals. 

The High priority Note provides multiple corrections (as an SAP Transport File) in SAP EAM add-on components, the company says. Addressed are vulnerabilities such as a missing authorization check in several Workbenches of MRO (CVSS 8.3) and directory traversals (CVSS 7.2) that could lead to an attacker reading, overwriting, deleting, or corrupting arbitrary files on the remote server. 

Related: SAP Releases 5 Security Notes on December 2019 Patch Day

Related: SAP Updates Four Hot News Notes on November 2019 Patch Day

Related: SAP Patches Critical Vulnerabilities With October 2019 Security Updates

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.