Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

SAP Security Patch Day – November 2024

SAP Security Patch Day – November 2024

Introduction

November 2024 brings critical updates for SAP systems worldwide with the release of new security patches addressing various vulnerabilities. This report provides a comprehensive analysis of the latest SAP security notes, their potential impact, and recommendations for maintaining a robust security posture.

Overview of November 2024 SAP Security Patches

This month, SAP has released a total of 10 security notes, including updates to existing ones. Notably, there are two high-priority patches that demand immediate attention from SAP administrators and security professionals.

Patch Breakdown:

  • High Priority: 2 patches
  • Medium Priority: 6 patches
  • Low Priority: 2 patches

Detailed Analysis of Key Security Notes

High Priority Patches

Note 3520281 – [CVE-2024-47590] Cross-Site Scripting (XSS) Vulnerability in SAP Web Dispatcher

Severity: High
CVSS Score: 8.8
Affected Component: SAP Web Dispatcher

Description:

A critical Cross-Site Scripting (XSS) vulnerability exists in SAP Web Dispatcher. An unauthenticated attacker can exploit this vulnerability to inject malicious scripts into the web interface, potentially leading to unauthorized access, data theft, or manipulation. Immediate patching is essential to protect the integrity and confidentiality of your SAP systems.

Note 3483344 – [CVE-2024-39592] Missing Authorization Check in SAP PDCE

Severity: High
CVSS Score: 7.7
Affected Component: SAP PDCE (Personnel Development and Capability Evaluation)

Description:

A missing authorization check in SAP PDCE could allow an authenticated attacker with low privileges to access sensitive data or perform unauthorized operations. Organizations utilizing SAP PDCE should apply this patch promptly to prevent potential data breaches and maintain compliance with security policies.

Medium Priority Patches

Note 3335394 – [CVE-2024-42372] Missing Authorization Check in SAP NetWeaver AS Java (System Landscape Directory)

Severity: Medium
CVSS Score: 6.5
Affected Component: SAP NetWeaver AS Java (System Landscape Directory)

Description:

This vulnerability involves missing authorization checks that could allow an unauthenticated attacker to access sensitive functions within the System Landscape Directory. Applying this patch is crucial to close the security gap and protect your system’s integrity.

Note 3509619 – [CVE-2024-47595] Local Privilege Escalation in SAP Host Agent

Severity: Medium
CVSS Score: 6.3
Affected Component: SAP Host Agent

Description:

A local privilege escalation vulnerability exists in SAP Host Agent. An attacker with local access and limited privileges could exploit this vulnerability to gain elevated privileges on the system. Timely application of this patch will prevent unauthorized privilege escalation and potential system compromise.

Note 3393899 – [CVE-2024-47592] Information Disclosure Vulnerability in SAP NetWeaver AS Java (Logon Application)

Severity: Medium
CVSS Score: 5.3
Affected Component: SAP NetWeaver AS Java (Logon Application)

Description:

This vulnerability could allow an attacker to access sensitive information without proper authorization by exploiting the logon application. Patching this vulnerability will help prevent unauthorized data access and potential information leaks.

Note 3504390 – [CVE-2024-47586] NULL Pointer Dereference Vulnerability in SAP NetWeaver AS ABAP and ABAP Platform

Severity: Medium
CVSS Score: 5.3
Affected Component: SAP NetWeaver AS ABAP and ABAP Platform

Description:

A NULL pointer dereference vulnerability could lead to a denial-of-service condition, causing the system to crash or become unresponsive. Applying this patch is important to ensure system stability and availability.

Note 3522953 – [CVE-2024-47588] Information Disclosure Vulnerability in SAP NetWeaver Java (Software Update Manager)

Severity: Medium
CVSS Score: 4.7
Affected Component: SAP NetWeaver Java (Software Update Manager)

Description:

This vulnerability may expose sensitive information during the software update process. Implementing the provided patch will safeguard against unauthorized data disclosure and enhance the security of your update procedures.

Note 3508947 – [CVE-2024-47593] Information Disclosure Vulnerability in SAP NetWeaver AS ABAP and ABAP Platform

Severity: Medium
CVSS Score: 4.3
Affected Component: SAP NetWeaver AS ABAP and ABAP Platform

Description:

An information disclosure vulnerability that could allow unauthorized access to sensitive data within the system. Patching this vulnerability is recommended to maintain data confidentiality and prevent potential exploitation.

Low Priority Patches

Note 3498470 – [CVE-2024-47587] Missing Authorization Check in SAP Cash Management (Cash Operations)

Severity: Low
CVSS Score: 3.5
Affected Component: SAP Cash Management (Cash Operations)

Description:

A missing authorization check could potentially allow unauthorized users to access specific functionalities within Cash Operations. Applying this patch will enhance security controls and prevent unauthorized transactions or data access.

Note 3392049 – [CVE-2024-33000] Missing Authorization Check in SAP Bank Account Management

Severity: Low
CVSS Score: 3.5
Affected Component: SAP Bank Account Management

Description:

This vulnerability may allow unauthorized users to access sensitive bank account information due to missing authorization checks. It is advisable to apply the patch to prevent unauthorized access and ensure compliance with financial data protection regulations.

The Importance of Timely Patch Management

The November 2024 SAP Security Patch Day highlights the ongoing need for proactive security measures within SAP environments. Unpatched vulnerabilities are a primary attack vector for cybercriminals, making prompt and effective patch management essential for minimizing security risks.

Complete List of November 2024 SAP Security Notes

Note# Title Priority CVSS Score
3520281 [CVE-2024-47590] Cross-Site Scripting (XSS) Vulnerability in SAP Web Dispatcher High 8.8
3483344 [CVE-2024-39592] Missing Authorization Check in SAP PDCE High 7.7
3335394 [CVE-2024-42372] Missing Authorization Check in SAP NetWeaver AS Java (System Landscape Directory) Medium 6.5
3509619 [CVE-2024-47595] Local Privilege Escalation in SAP Host Agent Medium 6.3
3393899 [CVE-2024-47592] Information Disclosure Vulnerability in SAP NetWeaver AS Java (Logon Application) Medium 5.3
3504390 [CVE-2024-47586] NULL Pointer Dereference Vulnerability in SAP NetWeaver AS ABAP and ABAP Platform Medium 5.3
3522953 [CVE-2024-47588] Information Disclosure Vulnerability in SAP NetWeaver Java (Software Update Manager) Medium 4.7
3508947 [CVE-2024-47593] Information Disclosure Vulnerability in SAP NetWeaver AS ABAP and ABAP Platform Medium 4.3
3498470 [CVE-2024-47587] Missing Authorization Check in SAP Cash Management (Cash Operations) Low 3.5
3392049 [CVE-2024-33000] Missing Authorization Check in SAP Bank Account Management Low 3.5

This list provides a clear overview of all security notes released in the November 2024 SAP Security Patch Day. It is crucial to review each note and assess its relevance to your SAP environment.

Conclusion

The November 2024 SAP Security Patch Day underscores the critical importance of maintaining vigilant security practices within SAP landscapes. By staying informed about these vulnerabilities and promptly applying the necessary patches, organizations can significantly reduce their risk exposure and maintain robust system security.

Explore More

RedRays AI for ABAP Code Security

Empowering Secure, Efficient, and Compliant SAP ABAP Development—in Real Time and Without Data Retention In today’s rapidly evolving business landscape, organizations increasingly

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.