{"id":13651,"date":"2025-10-16T09:52:27","date_gmt":"2025-10-16T07:52:27","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=13651"},"modified":"2025-10-16T09:52:27","modified_gmt":"2025-10-16T07:52:27","slug":"sap-security-notes-october-2025","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/","title":{"rendered":"SAP Security Notes, October 2025"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<h2>October 2025 Notes<\/h2>\n<h3>Monthly Summary and Highlights<\/h3>\n<div>\n<p class=\"elementToProof\">This month, the total number of notes is 17, which is 4 fewer than the previous month. We have 4 Hot News this month, the same as in the previous period. As for high-severity notes, there are 2, which is two fewer than last month. Medium and low-severity notes will not be reviewed, so <b>we will provide details on a total of 6 notes<\/b> (all those with a CVSS score of <b>7<\/b> or higher).<\/p>\n<p class=\"elementToProof\">We have <b>a total of 17 notes<\/b> for the entire month (13 new and 4 updates to notes published in previous months).<\/p>\n<p class=\"elementToProof\">We will review in detail a total of 6 notes, all of them classified as high severity and Hot News:<\/p>\n<ol start=\"1\">\n<li class=\"elementToProof\">\n<div role=\"presentation\"><b>The two highest-severity notes of the month (CVSS<\/b> <span style=\"color: #ff0000;\"><b>10<\/b><\/span><b>)<\/b> are Hot News with the maximum criticality score. One of the notes is new, and the other is an update to one published last month. They are related to <b>&#8220;Security Hardening for Insecure Deserialization in SAP NetWeaver AS Java&#8221;<\/b> and <b>&#8220;Insecure Deserialization vulnerability in SAP NetWeaver (RMI-P4)&#8221;<\/b>, respectively.<\/div>\n<\/li>\n<li class=\"elementToProof\">\n<div role=\"presentation\">The next one in severity <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>9.8<\/b><\/span><b>)<\/b> is another Hot News related to <b>&#8220;Directory Traversal vulnerability in SAP Print Service&#8221;<\/b>.<\/div>\n<\/li>\n<li class=\"elementToProof\">\n<div role=\"presentation\">The next one in severity <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>9.0<\/b><\/span><b>)<\/b> is the last Hot News of the month and is an update to one published in March 2023. It is related to <b>&#8220;Unrestricted File Upload Vulnerability in SAP Supplier Relationship Management&#8221;<\/b>.<\/div>\n<\/li>\n<li class=\"elementToProof\">\n<div role=\"presentation\">The next note in severity <b>(CVSS <\/b><span style=\"color: #ffcc00;\"><b>7.5<\/b><\/span><b>)<\/b> is the first high-severity note, and it concerns <b>&#8220;Denial of Service (DoS) in SAP Commerce Cloud (Search and Navigation)&#8221;<\/b>.<\/div>\n<\/li>\n<li class=\"elementToProof\">\n<div role=\"presentation\">Finally, the last note we will analyze, with a severity of <b>(CVSS <\/b><span style=\"color: #ffcc00;\"><b>7.1<\/b><\/span><b>)<\/b>, is related to <b>&#8220;Security Misconfiguration vulnerability in SAP Data Hub Integration Suite&#8221;<\/b>.<\/div>\n<\/li>\n<li class=\"elementToProof\">\n<div role=\"presentation\">This month, the most predominant types have been <b>&#8220;Directory Traversal vulnerability&#8221;<\/b> and <b>&#8220;Insecure Deserialization vulnerability&#8221;<\/b> (2\/13 on the patch day for both).<\/div>\n<\/li>\n<\/ol>\n<p class=\"elementToProof\">In the chart below, we can see the <b><u>classification of the October notes<\/u><\/b>, as well as the evolution and classification for the previous 5 months (only Security Tuesday \/ Patch Day notes \u2013 by SAP):<\/p>\n<\/div>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-13652\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/Portada-Notas-SAP.jpg\" alt=\"\" width=\"710\" height=\"373\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/Portada-Notas-SAP.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/Portada-Notas-SAP-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/Portada-Notas-SAP-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/Portada-Notas-SAP-600x315.jpg 600w\" sizes=\"(max-width: 710px) 100vw, 710px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol start=\"1\">\n<li class=\"elementToProof\">\n<div role=\"presentation\"><b>Insecure Deserialization vulnerability in SAP Netweaver (RMI-P4) <\/b>(update)<b> <u>(<\/u><\/b><b><a id=\"OWA72bf8b82-1d60-f9be-006e-23f385b48f12\" class=\"x_x_x_x_x_x_x_OWAAutoLink x_x_x_x_x_x_x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3634501\" data-auth=\"NotApplicable\">3634501<\/a><\/b><b><u>)<\/u>:<\/b>\u00a0Due to a deserialization vulnerability in SAP NetWeaver (RMI-P4), an unauthenticated attacker could exploit the system by sending malicious payloads to an open port, potentially leading to arbitrary OS command execution and a full compromise of confidentiality, integrity, and availability. The issue has been fixed by updating the affected P4-Lib component to enforce secure deserialization handling and restrict untrusted Java objects via the RMI-P4 module. SAP recommends implementing the patches listed in the \u201cSupport Packages &amp; Patches\u201d section and ensuring the Java Virtual Machine version is higher than Java 8u121 (refer to Note 2695197), while also reviewing Note 1974464 to avoid incompatibilities. For additional information, see Note 3637718 and, for further hardening, apply Note 3660659. If patching is not immediately possible, a temporary workaround involves isolating the system at the network level so that P4 and P4S ports are not accessible from insecure networks, ensuring these ports are reachable only from trusted systems through firewall rules or IP filtering. Once the patch is applied, the workaround can be rolled back.<b>\u00a0CVSS v3\u00a0Base Score <\/b><b>10<\/b><b>\/ 10 <\/b><b>[<a id=\"OWAb4cb3518-24b9-0f47-092d-99d3f5f96788\" class=\"x_x_x_x_x_x_x_OWAAutoLink x_x_x_x_x_x_x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42944\" data-auth=\"NotApplicable\">CVE-2025-42944<\/a>]<\/b><\/div>\n<\/li>\n<li class=\"elementToProof\">\n<div role=\"presentation\"><b>Security Hardening for Insecure Deserialization in SAP NetWeaver AS Java <\/b><b><u>(<\/u><\/b><b><a id=\"OWA4e5a8905-4373-2f8a-4a69-80e1aa6913da\" class=\"x_x_x_x_OWAAutoLink x_x_x_x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3660659\" data-auth=\"NotApplicable\">3660659<\/a><\/b><b><u>)<\/u>:<\/b>\u00a0SAP NetWeaver AS Java is vulnerable to remote code execution due to insecure deserialization of JDK and third-party classes, where specially crafted input could be deserialized by the AS Java runtime. Although no new CVE was issued, this advisory serves as a hardening measure linked to [CVE-2025-42944] with a CVSS score of 10.0 (Critical). The issue is resolved by blocking vulnerable JDK and third-party classes through a configuration-based patch that prevents insecure deserialization and enhances security for systems affected by the RMI\/P4 vulnerability (SAP Note 3634501). To apply the fix, ensure a Java Virtual Machine version higher than Java 8u121 is installed (per KBA 2695197), and that the &#8216;<code>bootstrap.properties'<\/code>\u00a0file includes the property &#8216;<code>element.resynch=DETECT'<\/code>\u00a0(SAP Note 710663). SAP also recommends checking Note 1974464 for compatibility guidance before applying the update. For more information, refer to FAQ KBA 3663688. A workaround may be considered depending on system applicability, though applying the patch remains the recommended permanent solution. <b>CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>10<\/b><\/span><b>\/ 10 <\/b><b>[<a id=\"OWAb1c79ce3-4d37-145f-028d-b73dd55acb08\" class=\"x_x_x_x_OWAAutoLink x_x_x_x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42944\" data-auth=\"NotApplicable\">CVE-2025-42944<\/a>]<\/b><\/div>\n<\/li>\n<li class=\"elementToProof\">\n<div role=\"presentation\"><b>Directory Traversal vulnerability in SAP Print Service<\/b><b>\u00a0(<\/b><b><a id=\"OWA7b0b0196-8aa2-1a97-08fb-e5a022f64717\" class=\"x_x_x_x_OWAAutoLink x_x_x_x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3630595\" data-auth=\"NotApplicable\">3630595<\/a><\/b><b>): <\/b>SAP Print Service (SAPSprint) is affected by a path traversal vulnerability due to insufficient validation of user-provided path information. An unauthenticated attacker could exploit this flaw to traverse directories and overwrite system files, leading to a high impact on the confidentiality, integrity, and availability of the application (CVE-2025-42937). The issue has been resolved by introducing proper validation of path inputs within SAPSprint. Users are advised to implement the patches listed in the \u201cSupport Packages &amp; Patches\u201d section of this SAP Security Note. For further details, refer to FAQ Note 3636888. No workaround is available for this vulnerability.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>9,8<\/b><\/span><b>\/ 10 <\/b><b>[<a id=\"OWA49337776-10eb-84cc-7862-6f6e4ec53785\" class=\"x_x_x_x_OWAAutoLink x_x_x_x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42937\" data-auth=\"NotApplicable\">CVE-2025-42937<\/a>]<\/b><\/div>\n<\/li>\n<li class=\"elementToProof\">\n<div role=\"presentation\"><b>Unrestricted File Upload Vulnerability in SAP Supplier Relationship Management<\/b><b>\u00a0(<\/b><b><a id=\"OWA6a7578e7-59e3-526e-c9f2-0a7e7f5f5377\" class=\"x_x_x_x_OWAAutoLink x_x_x_x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3647332\" data-auth=\"NotApplicable\">3647332<\/a><\/b><b>): <\/b>SAP Supplier Relationship Management is affected by an unrestricted file upload vulnerability caused by missing verification of file type or content. An authenticated attacker could exploit this flaw to upload arbitrary files, including executables that might be downloaded and executed by users, potentially leading to malware infections. Successful exploitation could result in a high impact on the confidentiality, integrity, and availability of the application (CVE-2025-42910). The issue has been resolved by implementing proper validation of MIME types and file extensions. Users should apply the Correction Instructions or Support Packages referenced in this SAP Security Note. No workaround is available.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>9,0<\/b><\/span><b>\/ 10 <\/b><b>[<a id=\"OWA3a740e10-565c-6d39-ff0b-604462b5c7ec\" class=\"x_x_x_x_OWAAutoLink x_x_x_x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42910\" data-auth=\"NotApplicable\">CVE-2025-42910<\/a>]<\/b><\/div>\n<\/li>\n<li class=\"elementToProof\">\n<div role=\"presentation\"><b>Denial of service (DOS) in SAP Commerce Cloud (Search and Navigation)<\/b><b>\u00a0(<\/b><b><a id=\"OWAe42c59f0-e8e8-360a-4449-749b9b21dc2f\" class=\"x_x_x_x_OWAAutoLink x_x_x_x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3664466\" data-auth=\"NotApplicable\">3664466<\/a><\/b><b>): <\/b>SAP Commerce Cloud Search and Navigation is vulnerable to a denial-of-service (DoS) attack caused by a flaw in the HTTP\/2 protocol within the Jetty library. A malicious client could send crafted requests that force the server to reset streams repeatedly, consuming excessive resources and leading to service disruption. This issue has a high impact on availability but does not affect confidentiality or integrity (CVE-2025-5115). The vulnerability is resolved by upgrading the Jetty http2-common library to the latest version, included in SAP Commerce Cloud Patch Releases 2211-jdk21.2, 2211.45, and 2205.43. Customers should install these or later patches, rebuild, and redeploy their SAP Commerce environments according to the deployment instructions provided in the SAP Support Portal.<b>\u00a0CVSS v3\u00a0Base Score <\/b> <span style=\"color: #ffcc00;\"><b>7,5<\/b><\/span><b>\/ 10 <\/b><b>[<a id=\"OWA8c7a7926-bdcd-2503-db38-8e64e15ef7b3\" class=\"x_x_x_x_OWAAutoLink x_x_x_x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-5115\" data-auth=\"NotApplicable\">CVE-2025-5115<\/a>]<\/b><\/div>\n<\/li>\n<li class=\"elementToProof\">\n<div role=\"presentation\"><b>Security Misconfiguration vulnerability in SAP Data Hub Integration Suite\u00a0(<\/b><b><a id=\"OWA2d662456-0e5e-b1f3-36f8-1f82f9df3137\" class=\"x_x_x_x_OWAAutoLink x_x_x_x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3658838\" data-auth=\"NotApplicable\">3658838<\/a><\/b><b>): <\/b>SAP Datahub Suite is affected by a vulnerability due to the use of Apache CXF 3.5.1 libraries with JMS\/JNDI configurations, allowing an unauthenticated attacker to inject malicious RMI\/LDAP endpoints (CVE-2025-48913). This could result in remote code execution, leading to a high impact on the confidentiality, integrity, and availability of the application. The issue is resolved by upgrading Apache CXF to version 3.6.8, which includes secure versions of multiple CXF components such as cxf-core, cxf-rt-bindings-soap, and cxf-rt-frontend-jaxws. Customers are advised to apply the SAP Commerce Integration Extension Pack Patch Release 2205.17, which contains the updated, non-vulnerable libraries. <b>CVSS v3\u00a0Base Score <\/b><span style=\"color: #ffcc00;\"><b>7,1<\/b><\/span><b>\/ 10 [<a id=\"OWA3034e28f-e4cc-8cc4-60d2-b4dd169ab36d\" class=\"x_x_x_x_OWAAutoLink x_x_x_x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-48913\" data-auth=\"NotApplicable\">CVE-2025-48913<\/a>]<\/b><\/div>\n<\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (october):<\/p>\n<p class=\"elementToProof\"><b><a id=\"LPlnk408712\" class=\"x_x_OWAAutoLink\" title=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/october-2025.html\" href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/october-2025.html\" data-auth=\"NotApplicable\">SAP Security Patch Day &#8211; October 2025<\/a><\/b><\/p>\n<p class=\"elementToProof\"><b><a id=\"LPlnk677648\" class=\"x_x_OWAAutoLink\" title=\"https:\/\/onapsis.com\/blog\/sap-security-patch-day-october-2025\/\" href=\"https:\/\/onapsis.com\/blog\/sap-security-patch-day-october-2025\/\" data-auth=\"NotApplicable\">SAP Patch Day: October 2025 &#8211; Onapsis<\/a><\/b><\/p>\n<p>&nbsp;<\/p>\n<p><strong style=\"color: #014888; font-family: inherit; font-size: 1.6rem; letter-spacing: 0em;\"><u>Resources affected<\/u><\/strong><\/p>\n<div class=\"w-post-elm post_content\">\n<p>The full list of affected systems\/components is as follows:<\/p>\n<div role=\"presentation\">\n<ul>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"354\" data-start=\"261\">\n<div>SAP NetWeaver AS Java\u00a0\u2013 SERVERCORE 7.50, J2EE-APPS 7.50, ADSSAP 7.50, WD-RUNTIME 7.50<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"470\" data-start=\"355\">\n<div>SAP NetWeaver AS ABAP\u00a0\u2013 SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"612\" data-start=\"471\">\n<div>SAP NetWeaver (Generic \/ RMI-P4 \/ Service Data Download \/ Background Processing)\u00a0\u2013 SAP_ABA 700\u201375I, ST-PI 2008_1_700, 2008_1_710, 740<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"769\" data-start=\"613\">\n<div>SAP NetWeaver Kernel Components\u00a0\u2013 KRNL64UC 7.22, 7.22EXT, KRNL64NUC 7.22, 7.22EXT, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.12, 9.14, 9.15, 9.16<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"899\" data-start=\"770\">\n<div>SAP NetWeaver Application Server ABAP (SAP GUI for HTML)\u00a0\u2013 KRNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, 7.93, 9.12, 9.14<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"948\" data-start=\"900\">\n<div>SAP Print Service\u00a0\u2013 SAPSPRINT 8.00, 8.10<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1046\" data-start=\"949\">\n<div>SAP S\/4HANA (Private Cloud or On-Premise)\u00a0\u2013 S4CORE 102, 103, 104, 105, 106, 107, 108, 109<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1131\" data-start=\"1047\">\n<div>SAP S\/4HANA (Manage Processing Rules &#8211; For Bank Statements)\u00a0\u2013 S4CORE 104\u2013109<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1203\" data-start=\"1132\">\n<div>SAP S\/4HANA (Manage Central Purchase Contract)\u00a0\u2013 S4CORE 106\u2013108<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1276\" data-start=\"1204\">\n<div>SAP S\/4HANA (Fiori App &#8211; Manage Payment Blocks)\u00a0\u2013 S4CORE 107\u2013108<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1340\" data-start=\"1277\">\n<div>SAP Business One (SLD)\u00a0\u2013 B1_ON_HANA 10.0, SAP-M-BO 10.0<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1492\" data-start=\"1341\">\n<div>SAP Landscape Transformation Replication Server\u00a0\u2013 DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1560\" data-start=\"1493\">\n<div>SAP HCM (My Timesheet Fiori 2.0 Application)\u00a0\u2013 GBX01HR5 605<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1634\" data-start=\"1561\">\n<div>SAP HCM (Approve Timesheets Fiori 2.0 Application)\u00a0\u2013 GBX01HR5 605<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1677\" data-start=\"1635\">\n<div>SAP Fiori (Launchpad)\u00a0\u2013 SAP_UI 754<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1763\" data-start=\"1678\">\n<div>SAP Fiori App (F4044 Manage Work Center Groups)\u00a0\u2013 UIS4HOP1 600, 700, 800, 900<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1832\" data-start=\"1764\">\n<div>SAP Commerce Cloud\u00a0\u2013 HY_COM 2205, COM_CLOUD 2211, 2211-JDK21<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1898\" data-start=\"1833\">\n<div>SAP Data Hub Integration Suite\u00a0\u2013 CX_DATAHUB_INT_PACK 2205<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"1950\" data-start=\"1899\">\n<div>SAP Datahub\u00a0\u2013 HY_DHUB 2205, DHUB_CLOUD 2211<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"2038\" data-start=\"1951\">\n<div>SAP BusinessObjects Business Intelligence Platform\u00a0\u2013 ENTERPRISE 430, 2025, 2027<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"2134\" data-start=\"2039\">\n<div>SAP BusinessObjects (Web Intelligence and Platform Search)\u00a0\u2013 ENTERPRISE 430, 2025, 2027<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"2222\" data-start=\"2135\">\n<div>SAP Supplier Relationship Management (SRM)\u00a0\u2013 SRM_SERVER 700, 701, 702, 713, 714<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"2314\" data-start=\"2223\">\n<div>SAP Supplier Relationship Management (Unrestricted File Upload)\u00a0\u2013 SRMNXP01 100, 150<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"2415\" data-start=\"2315\">\n<div>SAP Financial Service Claims Management\u00a0\u2013 INSURANCE 803, 804, 805, 806, S4CEXT 107, 108, 109<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"2484\" data-start=\"2416\">\n<div>SAP Cloud Appliance Library Appliances\u00a0\u2013 TITANIUM_WEBAPP 4.0<\/div>\n<\/li>\n<li class=\"x_x_elementToProof x_elementToProof elementToProof\" data-end=\"2590\" data-start=\"2485\">\n<div>SAP Business Planning and Consolidation\u00a0\u2013 BPC4HANA 200, 300, SAP_BW 750\u2013758, 816, 914, CPMBPC 810<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. October 2025 Notes Monthly Summary and Highlights This month, the total number of notes is 17, which is 4 fewer than the previous month. We have 4 Hot News this month, the same&#8230;<\/p>\n","protected":false},"author":6,"featured_media":13653,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[150],"class_list":["post-13651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2","tag-sap-notes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, October 2025 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from october 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, October 2025\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from october 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-16T07:52:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/Portada-Notas-SAP.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, October 2025\",\"datePublished\":\"2025-10-16T07:52:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/\"},\"wordCount\":1436,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Portada-Notas-SAP.jpg\",\"keywords\":[\"SAP Notes\"],\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/\",\"name\":\"SAP Security Notes, October 2025 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Portada-Notas-SAP.jpg\",\"datePublished\":\"2025-10-16T07:52:27+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from october 2025, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Portada-Notas-SAP.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Portada-Notas-SAP.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-october-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, October 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, October 2025 - Inprosec","description":"All updates to SAP systems notes from october 2025, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, October 2025","og_description":"All updates to SAP systems notes from october 2025, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/","og_site_name":"Inprosec","article_published_time":"2025-10-16T07:52:27+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/Portada-Notas-SAP.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, October 2025","datePublished":"2025-10-16T07:52:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/"},"wordCount":1436,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/Portada-Notas-SAP.jpg","keywords":["SAP Notes"],"articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/","name":"SAP Security Notes, October 2025 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/Portada-Notas-SAP.jpg","datePublished":"2025-10-16T07:52:27+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from october 2025, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/Portada-Notas-SAP.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/Portada-Notas-SAP.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-october-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, October 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=13651"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13651\/revisions"}],"predecessor-version":[{"id":13655,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13651\/revisions\/13655"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/13653"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=13651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=13651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=13651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}