{"id":13582,"date":"2025-08-13T11:03:40","date_gmt":"2025-08-13T09:03:40","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=13582"},"modified":"2025-08-13T11:03:40","modified_gmt":"2025-08-13T09:03:40","slug":"sap-security-notes-august-2025","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/","title":{"rendered":"SAP Security Notes, August 2025"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<h2>August 2025 Notes<\/h2>\n<h3>Monthly Summary and Highlights<\/h3>\n<div>\n<div class=\"elementToProof\">\n<p class=\"elementToProof\">This month the total number was 19 notes, 12 fewer than in the previous month. This month we had 3 Hot News, 3 fewer than in the previous period. Regarding high criticality notes, there are 2, which is 3 fewer than in the last 4 months, during which the same 5 notes of this level were repeated. Medium and low notes will not be reviewed, so <b>we will provide details on a total of 5 notes<\/b> (all those with a CVSS of <span style=\"color: #ffcc00;\"><b>7<\/b><\/span><b> <\/b>or higher).<\/p>\n<p class=\"elementToProof\">We have <b>a<\/b> <b>total of 19 notes<\/b> for the whole month (15 new ones and 4 updates of notes published in previous months).<\/p>\n<p class=\"elementToProof\">We will review in detail a total of 5 notes, all of them of high criticality and Hot News:<\/p>\n<ol start=\"1\">\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>The highest criticality notes of the month (CVSS<\/b><b> <\/b><span style=\"color: #ff0000;\"><b>9.9<\/b><\/span><b>) <\/b>are the 3 Hot News, which have the same score. Two of them are new notes related to <b>\u201cCode Injection Vulnerability in SAP Landscape Transformation (Analysis Platform)\u201d<\/b> and <b>\u201cCode Injection Vulnerability in SAP S\/4HANA (Private Cloud or On-Premise)\u201d<\/b>, while the other one is an update of a note released in April this year, related to <b>\u201cCode Injection Vulnerability in SAP S\/4HANA (Private Cloud or On-Premise)\u201d.<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">The next in criticality <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>8.8<\/b><\/span><b>)<\/b> is the first high note related to <b>\u201cBroken Authorization in SAP Business One (SLD)\u201d<\/b>.<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">Lastly, the final note we will analyze and the lowest in criticality <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>8.1<\/b><\/span><b>)<\/b> is a note related to <b>\u201cMultiple vulnerabilities in SAP NetWeaver Application Server ABAP (BIC Document)\u201d.<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">This month the most predominant type is <b>\u201cMissing Authorization Check\u201d (4\/19 on Patch Day)<\/b> followed by <b>\u201cCode Injection Vulnerability\u201d (3\/19 on Patch Day).<\/b><\/div>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p class=\"elementToProof\">In the chart we can see the <b><u>classification of the August notes<\/u><\/b>, as well as the evolution and classification of the last 5 previous months (only the notes from Sec. Tuesday \/ Patch Day \u2013 by SAP):<\/p>\n<\/div>\n<\/div>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-13583 \" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/notas-sap-agosto.jpg\" alt=\"\" width=\"700\" height=\"367\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/notas-sap-agosto.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/notas-sap-agosto-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/notas-sap-agosto-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/notas-sap-agosto-600x315.jpg 600w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol start=\"1\">\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Code Injection vulnerability in SAP S\/4HANA (Private Cloud or On-Premise)<\/b><b> <u>(<\/u><\/b><b><a id=\"LPlnkOWA9e07f789-ff07-bd76-5c41-01bcca79b9d3\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3627998\">3627998<\/a><\/b><b><u>)<\/u>:<\/b>\u00a0In SAP S\/4HANA, a vulnerability in a function module exposed via RFC can be exploited by a privileged user to inject arbitrary ABAP code, bypassing authorization checks and acting as a backdoor, risking full system compromise and impacting confidentiality, integrity, and availability. SAP has released a fix that removes this code injection risk by preventing arbitrary script or command execution, and the referenced Correction Instructions or Support Packages must be applied immediately, as no temporary workaround is available.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>9,9<\/b><\/span><b>\/ 10 [<\/b><b><a id=\"LPlnkOWA0ce30b57-f215-dcde-11d4-daae36f31f7c\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42957\">CVE-2025-42957<\/a><\/b><b>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Code Injection Vulnerability in SAP Landscape Transformation (Analysis Platform)<\/b><b><u>\u00a0(<\/u><\/b><b><a id=\"LPlnkOWAa542f9be-abac-7562-6954-52302b6916eb\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3633838\">3633838<\/a><\/b><b><u>)<\/u>:<\/b>\u00a0In SAP Landscape Transformation (SLT), a vulnerability in a function module exposed via RFC can be exploited by a privileged user to inject arbitrary ABAP code, bypassing authorization checks and acting as a backdoor, potentially leading to full system compromise and impacting confidentiality, integrity, and availability. SAP has issued a fix that removes the code injection risk by blocking arbitrary script or command execution, and the referenced <i>Correction Instructions<\/i>\u00a0or <i>Support Packages<\/i>\u00a0must be applied immediately, as no temporary workaround exists. <b>CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>9,9<\/b><\/span><b>\/ 10 [<\/b><b><a id=\"OWAb9ef6698-eca1-69cb-cd69-4647a7ef8d95\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42950\">CVE-2025-42950<\/a>]<\/b><b>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Code Injection Vulnerability in SAP S\/4HANA (Private Cloud or On-Premise)<\/b><b>\u00a0(<\/b><b><a id=\"LPlnkOWA791c2405-cefe-62cc-275a-0d363bb84844\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3581961\">3581961<\/a><\/b><b>): <\/b>In SAP S\/4HANA, a vulnerability in a function module exposed via RFC can be exploited by a privileged user to inject arbitrary ABAP code, bypassing authorization checks and acting as a backdoor, risking full system compromise and impacting confidentiality, integrity, and availability. <b>In the current version (V6, 12th August 2025), the note has been re-released with updated <i>Support Packages &amp; Patches<\/i>\u00a0information<\/b>, which must be applied promptly to address the issue. The fix removes the risk of code injection by blocking arbitrary script or command execution. There is no workaround, so implementing the updated instructions is critical to securing the system.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>9,9<\/b><\/span><b>\/ 10\u00a0 [<\/b><b><a id=\"LPlnkOWA71f14cc4-920a-7f66-20d6-dbc8381e23bf\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-27429\">CVE-2025-27429<\/a><\/b><b>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>\u00a0<\/b><b>Broken Authorization in SAP Business One (SLD)<\/b><b>\u00a0(<\/b><b><a id=\"LPlnkOWA04ff97c4-730f-4826-82c2-a74976683cb4\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3625403\">3625403<\/a><\/b><b>): <\/b>In SAP Business One (SLD), a broken authorization flaw allows an authenticated attacker to gain database administrator privileges by invoking a specific API, posing a high risk to confidentiality, integrity, and availability. The vulnerability occurs because the SLD backend service failed to enforce proper authorization for users logged in via the native client, exposing sensitive credentials. SAP has fixed the issue by revoking this API permission for normal users, ensuring only landscape administrators (e.g., <i>B1SiteUser<\/i>) can invoke it, adjusting database account usage in the client, and introducing an admin login prompt for privileged landscape management tasks. The referenced <i>Support Packages<\/i>\u00a0and <i>Patches<\/i>\u00a0must be applied immediately, as no workaround exists.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>8,8<\/b><\/span><b>\/ 10 [<\/b><b><a id=\"LPlnkOWA0e1cf957-fd12-ee74-90ea-d2494b25808e\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42951\">CVE-2025-42951<\/a><\/b><b>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Multiple vulnerabilities in SAP NetWeaver Application Server ABAP (BIC Document)<\/b><b>\u00a0(<\/b><b><a id=\"LPlnkOWA04717107-f7e8-5846-03fc-5b92002d4601\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3611184\">3611184<\/a><\/b><b>): <\/b>In SAP NetWeaver Application Server ABAP (BIC Document), multiple vulnerabilities were found due to missing input validation: <b>Memory Corruption<\/b>\u00a0(<i>CVE-2025-42976<\/i>) allows an authenticated attacker to send crafted requests that can crash the target component or perform out-of-bounds reads, exposing sensitive in-memory data; <b>Reflected Cross-Site Scripting (XSS)<\/b>\u00a0(<i>CVE-2025-42975<\/i>) lets an unauthenticated attacker trick a victim into executing malicious scripts in their browser via crafted URLs, potentially accessing or modifying web client data. SAP resolved the issue by improving input parameter validation. Customers must implement the <i>Correction Instructions<\/i>\u00a0or <i>Support Packages<\/i>\u00a0from the note. As a temporary workaround, the SICF service \u201cBIC\u201d can be deactivated, though SAP strongly recommends applying the permanent fix.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>8,1<\/b><\/span><b>\/ 10\u00a0 [<\/b><b><a id=\"LPlnkOWA9285f68b-f255-bbcf-a0a7-50f8b3f77e76\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42976\">CVE-2025-42976<\/a><\/b><b>]<\/b><\/div>\n<\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (august):<\/p>\n<p class=\"elementToProof\"><b><a id=\"LPlnk506732\" class=\"OWAAutoLink\" title=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/august-2025.html\" href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/august-2025.html\">SAP Security Patch Day &#8211; August 2025<\/a><\/b><\/p>\n<p class=\"elementToProof\"><b><a id=\"LPlnk700211\" class=\"OWAAutoLink\" title=\"https:\/\/onapsis.com\/blog\/sap-security-notes-august-2025-patch-day\/\" href=\"https:\/\/onapsis.com\/blog\/sap-security-notes-august-2025-patch-day\/\">SAP Patch Day: August 2025 &#8211; Onapsis<\/a><\/b><\/p>\n<p>&nbsp;<\/p>\n<p><strong style=\"color: #014888; font-family: inherit; font-size: 1.6rem; letter-spacing: 0em;\"><u>Resources affected<\/u><\/strong><\/p>\n<div class=\"w-post-elm post_content\">\n<p>The full list of affected systems\/components is as follows:<\/p>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\"><b>SAP S\/4HANA (Private Cloud or On-Premise)<\/b><br \/>\nVersiones: S4CORE 102, 103, 104, 105, 106, 107, 108 (incluye Bank Communication Management y Supplier invoice m\u00f3dulos en algunas notas)<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>SAP Landscape Transformation (Analysis Platform)<\/b><br \/>\nVersiones: DMIS 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>SAP Business One (SLD)<\/b><br \/>\nVersiones: B1_ON_HANA 10.0, SAP-M-BO 10.0<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>SAP NetWeaver Application Server ABAP (BIC Document)<\/b><br \/>\nVersiones: S4COREOP 104, 105, 106, 107, 108; SEM-BW 600, 602, 603, 604, 605, 634, 736, 746, 747, 748<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>SAP S\/4HANA (Bank Communication Management)<\/b><br \/>\nVersiones: SAP_APPL 606, SAP_FIN 617, 618, 720, 730; S4CORE 102, 103, 104, 105, 106, 107, 108<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>SAP NetWeaver Application Server ABAP<\/b><br \/>\nVersiones: KRNL64UC 7.53; KERNEL 7.53, 7.54, 7.77, 7.89, 7.93; SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816, 914, 916<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>SAP NetWeaver ABAP Platform<\/b><br \/>\nVersiones: S4CRM 100, 200, 204, 205, 206; S4CEXT 107, 108, 109; BBPCRM 713, 714; SAP_BASIS 758, 816, 916<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>SAP NetWeaver Enterprise Portal (OBN component)<\/b><br \/>\nVersiones: EP-RUNTIME 7.50<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>ABAP Platform<\/b><br \/>\nVersiones: SAP_BASIS 758, 816, 916<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>SAP GUI for Windows<\/b><br \/>\nVersiones: BC-FES-GUI 8.00<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>SAP S\/4HANA (Supplier invoice)<\/b><br \/>\nVersiones: S4CORE 102, 103, 104, 105, 106, 107, 108, 109<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>SAP NetWeaver<\/b><br \/>\nVersiones: SAP_ABA 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H, 75I<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Manager)<\/b><br \/>\nVersiones: KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53; KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93; 9.14, 9.15, 9.16<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>SAP Cloud Connector<\/b><br \/>\nVersiones: SAP_CLOUD_CONNECTOR 2.0<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>SAP Fiori (Launchpad)<\/b><br \/>\nVersiones: SAP_UI 754<\/div>\n<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. August 2025 Notes Monthly Summary and Highlights This month the total number was 19 notes, 12 fewer than in the previous month. This month we had 3 Hot News, 3 fewer than in&#8230;<\/p>\n","protected":false},"author":6,"featured_media":13584,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[150],"class_list":["post-13582","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2","tag-sap-notes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, August 2025 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from august 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, August 2025\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from august 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-13T09:03:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/notas-sap-agosto.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, August 2025\",\"datePublished\":\"2025-08-13T09:03:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/\"},\"wordCount\":1092,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/notas-sap-agosto.jpg\",\"keywords\":[\"SAP Notes\"],\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/\",\"name\":\"SAP Security Notes, August 2025 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/notas-sap-agosto.jpg\",\"datePublished\":\"2025-08-13T09:03:40+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from august 2025, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/notas-sap-agosto.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/notas-sap-agosto.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-august-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, August 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, August 2025 - Inprosec","description":"All updates to SAP systems notes from august 2025, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, August 2025","og_description":"All updates to SAP systems notes from august 2025, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/","og_site_name":"Inprosec","article_published_time":"2025-08-13T09:03:40+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/notas-sap-agosto.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, August 2025","datePublished":"2025-08-13T09:03:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/"},"wordCount":1092,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/notas-sap-agosto.jpg","keywords":["SAP Notes"],"articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/","name":"SAP Security Notes, August 2025 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/notas-sap-agosto.jpg","datePublished":"2025-08-13T09:03:40+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from august 2025, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/notas-sap-agosto.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/08\/notas-sap-agosto.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-august-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, August 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=13582"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13582\/revisions"}],"predecessor-version":[{"id":13586,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13582\/revisions\/13586"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/13584"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=13582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=13582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=13582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}