Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential information disclosure relating to NetWeaver BPM, SAP security note 1658646

Description

An attacker can discover information relating to internal interfaces who use SAP NetWeaver BPM. This information could be used to allow the attacker to specialize their attacks against internal interfaces and SAP NetWeaver BPM.

Available fix and Supported packages

  • BPEM-CORE | 7.20 | 7.20
  • BPEM-CORE | 7.30 | 7.30
  • BPEM-CORE | 7.31 | 7.31
  • BPEM CORE 7.20 | SP006 | 000001
  • BPEM CORE 7.20 | SP007 | 000000
  • BPEM CORE 7.30 | SP002 | 000004
  • BPEM CORE 7.30 | SP003 | 000005
  • BPEM CORE 7.30 | SP004 | 000002
  • BPEM CORE 7.30 | SP005 | 000002
  • BPEM CORE 7.30 | SP007 | 000000
  • BPEM CORE 7.31 | SP001 | 000001
  • BPEM CORE 7.31 | SP002 | 000000

Affected component

    BC-BMT-BPM-SRV
    Process Server

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1658646

TAGS

#Galaxy
#SAP-NW-BPM
#Business-Process-Management
#Information-disclosure

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below