{"id":10121,"date":"2024-02-19T13:29:04","date_gmt":"2024-02-19T11:29:04","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=10121"},"modified":"2024-02-19T13:29:04","modified_gmt":"2024-02-19T11:29:04","slug":"sap-security-notes-february-2024","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/","title":{"rendered":"SAP Security Notes, February 2024"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<h2>February 2024 notes<\/h2>\n<h3>Summary and highlights of the month<\/h3>\n<p>The total number of notes\/patches has been 16, 4 more than last month. The number of Hot News has been 2, 1 less than last month. On the other hand, it is worth noting that the number of high criticality notes has increased compared to last month: 6 this month. As always, we will leave the medium and low notes unchecked, but <strong>will detail a total of 8 notes<\/strong> (all those with a CVSS of 7 or higher).<\/p>\n<p>We have<strong> a total of 16 notes<\/strong> for the entire month (the 16 from Patch Tuesday, 13 new ones and 3 updates, which are 4 more notes than the last Patch Tuesday).<\/p>\n<p>We will review in detail a total of 8 notes, the 2 HotNews of this month: 1 new and 1 update, and the 6 high notes: 5 of them new and 1 update (those with CVSS greater than or equal to 7).<\/p>\n<ul>\n<li><strong>The most critical note of the month (with a CVSS of <span style=\"color: #ff0000;\">10<\/span>)<\/strong> is an update of the usual note related to &#8220;<strong>Google Chromium<\/strong>&#8220;.<\/li>\n<li>The next in criticality<strong> (CVSS <span style=\"color: #ff0000;\">9.1<\/span>)<\/strong> is a HotNews related to &#8220;<strong>Code Injection vulnerability in SAP ABA (Application Basis)<\/strong>&#8220;.<\/li>\n<li>The next in criticality (with <strong>CVSS <span style=\"color: #ff0000;\">8.8<\/span><\/strong>) is a high note related to &#8220;<strong>Cross Site Scripting vulnerability in NetWeaver AS Java (User Admin Application)<\/strong>&#8220;.<\/li>\n<li>The next in criticality (with <strong>CVSS <span style=\"color: #ff0000;\">8.6<\/span><\/strong>) is a high note related to &#8220;<strong>XXE vulnerability in SAP NetWeaver AS Java (Guided Procedures)<\/strong>&#8220;.<\/li>\n<li>The following in criticality (with <strong>CVSS <span style=\"color: #c4c400;\">7.6<\/span>, <span style=\"color: #c4c400;\">7.3<\/span>, and <span style=\"color: #c4c400;\">7.3<\/span><\/strong> respectively) are related to &#8220;<strong>Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI)&#8221;, &#8220;Code Injection vulnerability in SAP IDES Systems&#8221;, &#8220;Improper Certificate Validation in SAP Cloud Connector&#8221;, and &#8220;Information disclosure vulnerability in SAP GUI for Windows and SAP GUI for Java&#8221;. <\/strong><\/li>\n<li>This month the most predominant type is related to &#8220;<strong>Cross-Site Scripting (XSS)<\/strong>&#8221; (5\/16 on patch day).<\/li>\n<\/ul>\n<p>In the graph, we can see the <span style=\"text-decoration: underline;\"><strong>classification of the February notes<\/strong><\/span>, in addition to the evolution and classification of the last 5 previous months (only the notes from Sec. Tuesday \/ Patch Day \u2013 by SAP).<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-10123\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/02\/notas-sap-febrero-2024.jpg\" alt=\"\" width=\"800\" height=\"418\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/02\/notas-sap-febrero-2024.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/02\/notas-sap-febrero-2024-300x157.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/02\/notas-sap-febrero-2024-1024x535.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/02\/notas-sap-febrero-2024-600x314.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol>\n<li>\u00a0<b><u>Update -Security updates for the browser control Google Chromium delivered with SAP Business Client (2622660)<\/u><\/b><b>:<\/b>\u00a0This security note addresses multiple vulnerabilities in the 3rd party web browser control\u00a0Chromium, which can be used\u00a0within\u00a0SAP\u00a0Business\u00a0Client. This note will be modified periodically based on web browser updates by the open-source project\u00a0Chromium. The note priority is based on the highest CVSS score of all the vulnerabilities fixed in the latest browser release. If the\u00a0SAP\u00a0Business\u00a0Client\u00a0release is not updated to the latest patch level, displaying web pages in\u00a0SAP\u00a0Business\u00a0Client\u00a0via this open-source browser control might lead to different vulnerabilities like memory corruption, Information Disclosure and the like. The solution will be to update the\u00a0SAP\u00a0Business\u00a0Client\u00a0patch to the newest one, which contains the most current stable major release of the\u00a0Chromium\u00a0browser control, which passed the\u00a0SAP\u00a0internal quality measurements of\u00a0SAP\u00a0Business\u00a0Client. The note has been re-released\u00a0with\u00a0updated \u2018Solution\u2019 and \u2018Support Packages &amp; Patches\u2019 information. <b>CVSS v3 Base Score: <\/b><span style=\"color: #ff0000;\"><b>10<\/b><\/span><b> \/ 10 (Multiple CVE\u00b4s).<\/b><\/li>\n<li><b><u>Code Injection vulnerability in SAP ABA (Application Basis)\u00a0(3420923<\/u><\/b>): An authenticated attacker can exploit a vulnerable interface to perform unauthorized actions, which could compromise data and affect system availability; it is recommended to implement additional measures besides securing the S_RFC authorization object to mitigate this risk in CA-SUR. The solution is to implement support package or remediation instructions. <b>CVSS v3 Base Score: <\/b><span style=\"color: #ff0000;\"><b>9,1<\/b><\/span><b> \/ 10 [CVE-2024-22131].<\/b><\/li>\n<li><b><u>Cross Site Scripting vulnerability in NetWeaver AS Java (User Admin Application)\u00a0(3417627<\/u><\/b><b>)<\/b>: SAP NetWeaver AS for Java User Admin application has an XSS vulnerability due to insufficient validation and encoding of URL parameters, with high impact on confidentiality and low impact on integrity and availability.<b>\u00a0<\/b><b>CVSS v3 Base Score: <\/b><span style=\"color: #ff0000;\"><b>8,8<\/b><\/span><b> \/ 10 [CVE-2024-22126].<\/b><\/li>\n<li><b><u>XXE vulnerability in SAP NetWeaver AS Java (Guided Procedures) (3426111<\/u><\/b><b>)<\/b>: SAP NetWeaver AS Java (CAF &#8211; Guided Procedures) has a vulnerability that allows an unauthenticated attacker to access sensitive files and data through a malicious XML request, but cannot modify them.<b>\u00a0CVSS v3 Base Score: <\/b><span style=\"color: #ff0000;\"><b>8,6<\/b><\/span><b> \/ 10 [CVE-2024-24743].<\/b><\/li>\n<li><b><u>Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI) (3410875<\/u><\/b>): The print preview option in SAP CRM WebClient has a Cross-Site Scripting vulnerability due to insufficient encryption of user input, which could be exploited by a low-privileged attacker to impact data confidentiality and integrity. <b>CVSS v3 Base Score: <\/b><span style=\"color: #c7c700;\"><b>7,6<\/b><\/span><b> \/ 10 [CVE-2024-22130].<\/b><\/li>\n<li><b><u>Code Injection vulnerability in SAP IDES Systems (3421659):<\/u><\/b><b>\u00a0<\/b>SAP IDES ECC systems have a vulnerability that allows the execution of arbitrary program code by the user, which could be exploited by an attacker. The solution involves removing the vulnerable code through changes to the transport and it is recommended not to install the IDES demo system on the same network as the productive environment and to always separate the demo environments from the productive ones, as well as to avoid installing real master data on the IDES system.<b>\u00a0CVSS v3 Base Score: <\/b><span style=\"color: #c7c700;\"><b>7,4<\/b><\/span><b> \/ 10 [CVE-2024-22132].<\/b><\/li>\n<li><b><u>Improper Certificate Validation in SAP Cloud Connector (3424610<\/u><\/b><b>):<\/b>\u00a0Incorrect certificate validation in SAP Cloud Connector allows an attacker to spoof authentic servers, breaking mutual authentication and possibly intercepting requests to view or modify sensitive information. The fix is available as of SAP Cloud Connector 2.16.2, with no impact on system availability. <span style=\"color: #c7c700;\"><b>7,4<\/b><\/span><b> \/ 10 [CVE-2024-22642].<\/b><\/li>\n<li><b><u>Update &#8211; Information disclosure vulnerability in SAP GUI for WIndows and SAP GUI for Java (3385711):<\/u><\/b><b>\u00a0<\/b>SAP GUI for Windows and SAP GUI for Java allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to create Layout configurations of the ABAP List Viewer and with this causing a mild impact on integrity and availability. <span style=\"color: #c7c700;\"><b>7,3<\/b><\/span><b>\u00a0\/ 10 [CVE-2023-49580].<\/b><\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (February):<\/p>\n<p><u><a href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/february-2024.html\">Digital Library (sap.com)<\/a><\/u><\/p>\n<p><u><a href=\"https:\/\/onapsis.com\/blog\/sap-patch-day-february-2024\/\">SAP Patch Day: February 2024 &#8211; Onapsis<\/a><\/u><\/p>\n<p>&nbsp;<\/p>\n<p><strong style=\"color: #014888; font-family: inherit; font-size: 1.6rem; letter-spacing: 0em;\"><u>Resources affected<\/u><\/strong><\/p>\n<div class=\"w-post-elm post_content\">\n<ul>\n<li>SAP Business Client, Versions &#8211; 6.5, 7.0, 7.70<\/li>\n<li>SAP ABA (Application Basis), Versions &#8211; 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I<\/li>\n<li>SAP NetWeaver AS Java (User Admin Application), Version &#8211; 7.50<\/li>\n<li>SAP NetWeaver AS Java (Guided Procedures), Version &#8211; 7.50<\/li>\n<li>AP CRM WebClient UI, Versions &#8211; S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, S4FND 108, WEBCUIF 700, WEBCUIF 701, WEBCUIF 730, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801<\/li>\n<li>IDES Systems, Versions \u2013 All version<\/li>\n<li>SAP Cloud Connector, Version &#8211; 2.0<\/li>\n<li>SAP GUI for Windows and SAP GUI for Java, Versions \u2013 SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. February 2024 notes Summary and highlights of the month The total number of notes\/patches has been 16, 4 more than last month. The number of Hot News has been 2, 1 less than&#8230;<\/p>\n","protected":false},"author":6,"featured_media":10123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[],"class_list":["post-10121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, February 2024 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from February 2024, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, February 2024\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from February 2024, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-19T11:29:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/02\/notas-sap-febrero-2024.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, February 2024\",\"datePublished\":\"2024-02-19T11:29:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/\"},\"wordCount\":1065,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/notas-sap-febrero-2024.jpg\",\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/\",\"name\":\"SAP Security Notes, February 2024 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/notas-sap-febrero-2024.jpg\",\"datePublished\":\"2024-02-19T11:29:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from February 2024, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/notas-sap-febrero-2024.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/notas-sap-febrero-2024.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-february-2024\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, February 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, February 2024 - Inprosec","description":"All updates to SAP systems notes from February 2024, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, February 2024","og_description":"All updates to SAP systems notes from February 2024, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/","og_site_name":"Inprosec","article_published_time":"2024-02-19T11:29:04+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/02\/notas-sap-febrero-2024.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, February 2024","datePublished":"2024-02-19T11:29:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/"},"wordCount":1065,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/02\/notas-sap-febrero-2024.jpg","articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/","name":"SAP Security Notes, February 2024 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/02\/notas-sap-febrero-2024.jpg","datePublished":"2024-02-19T11:29:04+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from February 2024, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/02\/notas-sap-febrero-2024.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/02\/notas-sap-febrero-2024.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-february-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, February 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/10121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=10121"}],"version-history":[{"count":2,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/10121\/revisions"}],"predecessor-version":[{"id":10127,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/10121\/revisions\/10127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/10123"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=10121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=10121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=10121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}