{"id":12652,"date":"2025-01-16T10:57:11","date_gmt":"2025-01-16T08:57:11","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=12652"},"modified":"2025-01-16T10:57:11","modified_gmt":"2025-01-16T08:57:11","slug":"sap-security-notes-january-2024-2","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/","title":{"rendered":"SAP Security Notes, January 2024"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<h2>January 2024 Notes<\/h2>\n<h3>Summary and Highlights of the Month<\/h3>\n<div>\n<p>This month, the total number of notes\/patches has been 14, just 1 more than last month. This month there were 2 HotNews, while the previous month there was only 1. Regarding the number of high-criticality notes, there has been a reduction of 1 for the current month, decreasing from 4 to 3. Medium- and low-criticality notes will not be reviewed, so <b>we will provide details for a total of 5 notes<\/b> (all those with a CVSS of <b>7<\/b><b> <\/b>or higher).<\/p>\n<p>We have <b>a<\/b>\u00a0<b>total of 14 notes<\/b> for the entire month (all 14 from Patch Tuesday are new, so there are no updates).<\/p>\n<p>We will review in detail a total of 5 notes, the 3 high-criticality notes, and the 2 HotNews:<\/p>\n<ol start=\"1\">\n<li>\n<div><b>The most critical notes of the month (<\/b>with<b>\u00a0CVSS<\/b><b>\u00a0<span style=\"color: #ff0000;\">9.9<\/span><\/b><b>) <\/b>are the two HotNews, related to<b>\u00a0\u201cImproper Authentication in SAP NetWeaver ABAP Server and ABAP Platform\u201d and &#8220;Information Disclosure vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Framework)&#8221;.<\/b><\/div>\n<\/li>\n<li>\n<div>The next in criticality<b>\u00a0(CVSS<\/b>\u00a0<span style=\"color: #ff0000;\"><b>8.8<\/b><\/span><b>)<\/b>\u00a0is a note related to <b>\u201cSQL Injection vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform\u201d.<\/b><\/div>\n<\/li>\n<li>\n<div>The next in criticality<b>\u00a0(CVSS<\/b>\u00a0<span style=\"color: #ff0000;\"><b>8.7<\/b><\/span><b>)<\/b>\u00a0is a note related to <b>\u201cMultiple vulnerabilities in SAP BusinessObjects Business Intelligence Platform\u201d.<\/b><\/div>\n<\/li>\n<li>\n<div>The next in criticality<b>\u00a0(CVSS<\/b>\u00a0<span style=\"color: #ffcc00;\"><b>7.8<\/b><\/span><b>)<\/b>\u00a0is a note related to <b>\u201cDLL Hijacking vulnerability in SAPSetup\u201d.<\/b><\/div>\n<\/li>\n<li>\n<div>This month, the most predominant type is related to <b>\u201cInformation\u00a0Disclosure vulnerability<\/b><b>\u201d<\/b>\u00a0(6\/14 in Patch Day).<\/div>\n<\/li>\n<\/ol>\n<p>In the chart, we can see the <b><u>classification of January&#8217;s notes<\/u><\/b>, as well as the evolution and classification of the last 5 previous months (only the notes from Sec. Tuesday \/ Patch Day \u2013 by SAP):<\/p>\n<\/div>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-12654\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/01\/notas-sap-enero-2025.jpg\" alt=\"\" width=\"700\" height=\"368\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/01\/notas-sap-enero-2025.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/01\/notas-sap-enero-2025-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/01\/notas-sap-enero-2025-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/01\/notas-sap-enero-2025-600x315.jpg 600w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol start=\"1\">\n<li>\n<div>\u00a0<b><u>Autenticaci\u00f3n inadecuada en SAP NetWeaver ABAP Server and ABAP Platform (3537476)<\/u>:<\/b>\u00a0SAP NetWeaver Application Server for ABAP y ABAP Platform permiten que un atacante autenticado obtenga acceso ileg\u00edtimo al sistema al explotar comprobaciones de autenticaci\u00f3n inadecuadas, lo que resulta en una escalada de privilegios. Si se explota con \u00e9xito, esto puede provocar problemas de seguridad potenciales. Esto tiene un alto impacto en la confidencialidad, integridad y disponibilidad. <b>Puntuaci\u00f3n Base CVSS v3 <\/b><span style=\"color: #ff0000;\"><b>9,9<\/b><\/span><b>\/ 10 [CVE-2025-0070]<\/b><\/div>\n<\/li>\n<li>\n<div><b><\/b><b><u>Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en SAP NetWeaver AS for ABAP y ABAP Platform (Internet Communication Framework) (3550708)<\/u>:<\/b>\u00a0En ciertas condiciones, SAP NetWeaver AS for ABAP y ABAP Platform (Internet Communication Framework) permiten que un atacante acceda a informaci\u00f3n restringida debido a controles de acceso d\u00e9biles. Esto puede tener un impacto significativo en la confidencialidad, integridad y disponibilidad de una aplicaci\u00f3n.\u00a0 <b>Puntuaci\u00f3n Base CVSS v3 <\/b><span style=\"color: #ff0000;\"><b>9,9<\/b><\/span><b>\/ 10 [CVE-2025-0066]<\/b><b>\u00a0<\/b><\/div>\n<\/li>\n<\/ol>\n<ol start=\"3\">\n<li>\n<div>\u00a0<b><u>Vulnerabilidad de inyecci\u00f3n SQL en SAP NetWeaver AS for ABAP y ABAP Platform\u00a0(3550816)<\/u>:<\/b>\u00a0SAP NetWeaver AS ABAP y ABAP Platform no verifican autorizaciones cuando un usuario ejecuta algunos m\u00f3dulos de funci\u00f3n RFC. Esto podr\u00eda permitir que un atacante con privilegios b\u00e1sicos de usuario obtenga control sobre los datos en la base de datos Informix, lo que llevar\u00eda a un compromiso total de la confidencialidad, integridad y disponibilidad. Existe una soluci\u00f3n alternativa. <b>Puntuaci\u00f3n Base CVSS v3 <\/b><span style=\"color: #ff0000;\"><b>8,8<\/b><\/span><b>\/ 10 [CVE-2025-0063]<\/b><b>\u00a0<\/b><\/div>\n<\/li>\n<\/ol>\n<ol start=\"4\">\n<li>\n<div>\u00a0<b><u>M\u00faltiples vulnerabilidades en SAP BusinessObjects Business Intelligence Platform\u00a0(<\/u><\/b><b><u>3474398<\/u><\/b><b><u>)<\/u>:<\/b>\u00a0Esta nota de seguridad aborda dos vulnerabilidades en SAP BusinessObjects Business Intelligence Platform. Los detalles de la vulnerabilidad con un CVSS superior a 7 corresponden a una divulgaci\u00f3n de informaci\u00f3n [CVE-2025-0061]. Este documento describe c\u00f3mo SAP BusinessObjects Business Intelligence Platform permite que un atacante no autenticado realice secuestro de sesi\u00f3n a trav\u00e9s de la red sin interacci\u00f3n del usuario, debido a una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n. El atacante puede acceder y modificar los datos del usuario en la aplicaci\u00f3n.\u00a0<b>Puntuaci\u00f3n Base CVSS v3 <\/b><span style=\"color: #ff0000;\"><b>8,7<\/b><\/span><b>\/ 10 [CVE-2025-0061]<\/b><b>\u00a0<\/b><\/div>\n<\/li>\n<\/ol>\n<ol start=\"5\">\n<li>\n<div>\u00a0<b><u>Vulnerabilidad de secuestro de DLL en SAPSetup <\/u><\/b><b><u>(3542533<\/u><\/b><b><u>)<\/u>: <\/b>Debido a una vulnerabilidad de inyecci\u00f3n de DLL en SAPSetup, un atacante con privilegios de usuario local o con acceso a la cuenta Windows de un usuario corporativo comprometido podr\u00eda obtener privilegios m\u00e1s altos. Con esto, podr\u00eda moverse lateralmente dentro de la red y comprometer a\u00fan m\u00e1s el directorio activo de una empresa. Esto genera un alto impacto en la confidencialidad, integridad y disponibilidad del servidor Windows.\u00a0<b>Puntuaci\u00f3n Base CVSS v3 <\/b><span style=\"color: #ffcc00;\"><b>7,8<\/b><\/span><b>\/ 10 [CVE-2025-0069]<\/b><\/div>\n<\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (december):<\/p>\n<p><b><u><a id=\"OWA01bc0ebf-7062-8d6a-c65f-3dced8291a38\" class=\"x_x_x_x_OWAAutoLink\" title=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/january-2025.html\" href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/january-2025.html\" data-auth=\"NotApplicable\">SAP Security Patch Day \u2013 January 2025<\/a><\/u><\/b><\/p>\n<p><b><u><a id=\"OWA88b9ad0f-061b-0456-7c9b-d7efad8420c6\" class=\"x_x_x_x_OWAAutoLink\" title=\"https:\/\/onapsis.com\/blog\/sap-patch-day-january-2025\/\" href=\"https:\/\/onapsis.com\/blog\/sap-patch-day-january-2025\/\" data-auth=\"NotApplicable\">SAP Patch Day: January 2024 &#8211; Onapsis<\/a><\/u><\/b><\/p>\n<p>&nbsp;<\/p>\n<p><strong style=\"color: #014888; font-family: inherit; font-size: 1.6rem; letter-spacing: 0em;\"><u>Resources affected<\/u><\/strong><\/p>\n<div class=\"w-post-elm post_content\">\n<ul>\n<li>\n<div>SAP BusinessObjects Business Intelligence Platform, Versions \u2013 ENTERPRISE 420, 430, 2025<\/div>\n<\/li>\n<li>\n<div>SAP NetWeaver Application Server for ABAP and ABAP Platform, Versions \u2013 KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, 8.04, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 7.97, 8.04, 9.12, 9.13, 9.14<\/div>\n<\/li>\n<li>\n<div>SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Framework), Versions \u2013 SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 912, SAP_BASIS 913, SAP_BASIS 914<\/div>\n<\/li>\n<li>\n<div>SAPSetup, Version \u2013 LMSAPSETUP 9.0<\/div>\n<\/li>\n<li>\n<div>SAP NetWeaver Application Server Java, Version \u2013 WD-RUNTIME 7.50<\/div>\n<\/li>\n<li>\n<div>SAP GUI for Windows, Versions \u2013 BC-FES-GUI 8.0<\/div>\n<\/li>\n<li>\n<div>SAP GUI for Java, Versions \u2013 BC-FES-JAV 7.80<\/div>\n<\/li>\n<li>\n<div>SAP NetWeaver AS JAVA (User Admin Application), Version &#8211; ENGINEAPI 7.50, SERVERCORE 7.50, UMEADMIN 7.50<\/div>\n<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. January 2024 Notes Summary and Highlights of the Month This month, the total number of notes\/patches has been 14, just 1 more than last month. This month there were 2 HotNews, while the&#8230;<\/p>\n","protected":false},"author":6,"featured_media":12654,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[150],"class_list":["post-12652","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2","tag-sap-notes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, January 2024 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from january 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, January 2024\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from january 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-16T08:57:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/01\/notas-sap-enero-2025.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, January 2024\",\"datePublished\":\"2025-01-16T08:57:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/\"},\"wordCount\":854,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/notas-sap-enero-2025.jpg\",\"keywords\":[\"SAP Notes\"],\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/\",\"name\":\"SAP Security Notes, January 2024 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/notas-sap-enero-2025.jpg\",\"datePublished\":\"2025-01-16T08:57:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from january 2025, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/notas-sap-enero-2025.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/notas-sap-enero-2025.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, January 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, January 2024 - Inprosec","description":"All updates to SAP systems notes from january 2025, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, January 2024","og_description":"All updates to SAP systems notes from january 2025, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/","og_site_name":"Inprosec","article_published_time":"2025-01-16T08:57:11+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/01\/notas-sap-enero-2025.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, January 2024","datePublished":"2025-01-16T08:57:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/"},"wordCount":854,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/01\/notas-sap-enero-2025.jpg","keywords":["SAP Notes"],"articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/","name":"SAP Security Notes, January 2024 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/01\/notas-sap-enero-2025.jpg","datePublished":"2025-01-16T08:57:11+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from january 2025, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/01\/notas-sap-enero-2025.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/01\/notas-sap-enero-2025.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, January 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/12652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=12652"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/12652\/revisions"}],"predecessor-version":[{"id":12656,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/12652\/revisions\/12656"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/12654"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=12652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=12652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=12652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}