{"id":13732,"date":"2025-11-13T11:50:57","date_gmt":"2025-11-13T09:50:57","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=13732"},"modified":"2025-11-13T11:50:57","modified_gmt":"2025-11-13T09:50:57","slug":"sap-security-notes-november-2025","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/","title":{"rendered":"SAP Security Notes, November 2025"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<div>\n<h2><\/h2>\n<h2>November 2025 Notes<\/h2>\n<h3>Summary and Highlights of the Month<\/h3>\n<div>\n<div class=\"elementToProof\">\n<p class=\"elementToProof\">This month, the total number of notes was 20, which is 2 more than in the previous month. We had 3 Hot News this month, one less than in the previous period. As for high-criticality notes, there is 1, which is also one less than last month. Medium and low notes will not be reviewed, so <b>we will provide details for a total of 4 notes<\/b> (all those with a CVSS of <b>7<\/b> or higher).<\/p>\n<p class=\"elementToProof\">We have <b>a total of 20 notes<\/b> for the entire month (18 new and 2 updates of notes published in previous months).<\/p>\n<p>We will review in detail a total of 4 notes, all of them high-criticality and Hot News:<\/p>\n<ol start=\"1\">\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>The 2 most critical notes of the month (CVSS<\/b><b> <\/b><span style=\"color: #ff0000;\"><b>10<\/b><\/span><b>)<\/b> are Hot News with the maximum severity score. One of the notes is new, and the other is an update of one published last month. They are related to <b>&#8220;Insecure key &amp; Secret Management vulnerability in SQL Anywhere Monitor (Non-Gui)&#8221;<\/b> and <b>\u201cSecurity Hardening for Insecure Deserialization in SAP NetWeaver AS Java\u201d,<\/b> respectively.<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">The next one in terms of criticality <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>9.9<\/b><\/span><b>)<\/b> is another Hot News and the last one of the month, related to &#8220;<b>Code Injection vulnerability in SAP Solution Manager<\/b>&#8220;.<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">The last note of the month we will review <b>(CVSS <\/b><span style=\"color: #ffcc00;\"><b>7.5<\/b><\/span><b>)<\/b> is the only one with high criticality, and it is related to <b>\u201cMemory Corruption vulnerability in SAP CommonCryptoLib\u201d.<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">This month, 75% of the notes to be analyzed are Hot News (3\/4), so even though there are few high-criticality notes, they are highly relevant.<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">This month, the most predominant type was <b>&#8220;Information Disclosure vulnerability&#8221; (3\/20 on the patch day)<\/b>, followed by <b>&#8220;Code Injection vulnerability&#8221;<\/b> and <b>&#8220;Missing Authorization check&#8221; (2\/20 each)<\/b>.<\/div>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p class=\"elementToProof\">In the chart below, we can see the <b><u>classification of the November notes<\/u><\/b>, as well as the trend and classification over the past 5 months (only the Sec. Tuesday \/ Patch Day notes \u2013 by SAP):<\/p>\n<\/div>\n<\/div>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-13733\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/Portada-Notas-SAP.png\" alt=\"\" width=\"931\" height=\"489\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/Portada-Notas-SAP.png 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/Portada-Notas-SAP-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/Portada-Notas-SAP-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/Portada-Notas-SAP-600x315.png 600w\" sizes=\"(max-width: 931px) 100vw, 931px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol start=\"1\">\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Security Hardening for Insecure Deserialization in SAP NetWeaver AS Java <\/b>(update) <b><u>(<\/u><\/b><b><a id=\"OWA17ae1b59-92c6-4ab4-b0dc-15132ac1467d\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3660659\">3660659<\/a><\/b><b><u>)<\/u>:<\/b>\u00a0SAP NetWeaver AS Java is vulnerable to remote code execution due to insecure deserialization of JDK and third-party classes. This update (v40 \u2013 November 11, 2025) strengthens security hardening for CVE-2025-42944 (CVSS 10.0 \u2013 Critical)\u00a0by adding new prerequisites (SAP Note 3670067), removing outdated optional class disclaimers, and expanding hardening guidance. The fix blocks vulnerable classes and enforces deserialization restrictions in the AS Java runtime. Customers must ensure JVM version &gt; 8u121, set <code>element.resynch=DETECT<\/code>\u00a0in <code>bootstrap.properties<\/code>, and apply the referenced notes. A temporary workaround is to add the <code>jdk.serialFilter<\/code>\u00a0parameter at JVM level, though SAP recommends applying the full correction.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>10<\/b><\/span><b>\/ 10 <\/b><b>[<a id=\"OWA4900a74a-75ff-0727-ba53-12494c730c9d\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42944\">CVE-2025-42944<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Insecure key &amp; Secret Management vulnerability in SQL Anywhere Monitor (Non-Gui) <\/b><b><u>(<\/u><\/b><b><a id=\"OWA4dd66a22-45b2-b503-93ab-b1c21eede7ac\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3666261\">3666261<\/a><\/b><b><u>)<\/u>:<\/b>\u00a0A vulnerability in <b>SQL Anywhere Monitor (Non-GUI)<\/b>\u00a0involved hard-coded credentials embedded within the code, potentially allowing unauthorized users to gain access and execute arbitrary code, impacting confidentiality, integrity, and availability. The issue arose because the Monitor, originally intended to replace Adobe Flash functionality, provided default database access that some environments failed to secure properly. The solution completely removes the SQL Anywhere Monitor and deletes associated databases in default locations, with historical data unloaded. The fix is available in SQL Anywhere 17.0 SP1 PL20 Build 8039. As a workaround, administrators should discontinue and delete any existing SQL Anywhere Monitor instances (samonitor.db)\u00a0and transition to SQL Anywhere Cockpit\u00a0for monitoring functionality. <b>CVSS v3\u00a0Base Score <\/b> <span style=\"color: #ff0000;\"><b>10<\/b><\/span><b>\/ 10 <\/b><b>[<a id=\"OWA9d71c27a-075c-629d-bcb7-d73134032064\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42890\">CVE-2025-42890<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Code Injection vulnerability in SAP Solution Manager<\/b><b>\u00a0(<\/b><b><a id=\"OWA6bce4972-7cf9-1ea9-ffda-04bf891e9790\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3668705\">3668705<\/a><\/b><b>): <\/b>An authenticated attacker could exploit missing input sanitation in a remote-enabled function module of SAP Solution Manager, enabling ABAP code injection (CVE-2025-42887)\u00a0and potentially gaining full system control, resulting in high impact on confidentiality, integrity, and availability. The vulnerability is resolved by adding input sanitization logic that rejects non-alphanumeric characters. SAP recommends applying the provided correction instructions or support packages, as no workaround is available.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>9,9<\/b><\/span><b>\/ 10 <\/b><b>[<a id=\"OWA51691ffd-e560-256a-7189-51d3f1c646ee\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42887\">CVE-2025-42887<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Memory Corruption vulnerability in SAP CommonCryptoLib<\/b><b>\u00a0(<\/b><b><a id=\"OWAe62cc431-52f3-7064-1487-36cd5ca3b0e5\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3633049\">3633049<\/a><\/b><b>): <\/b>A vulnerability in SAP CommonCryptoLib\u00a0allows an attacker to send specially crafted ASN.1 data during pre-authentication, causing memory corruption and application crashes\u00a0due to missing boundary checks (CVE-2025-42940). This flaw impacts availability\u00a0but not confidentiality or integrity. The issue is resolved by enhancing boundary validation \u2014 users should upgrade to CommonCryptoLib version 8.5.60 or higher. Refer to SAP Notes 3628110\u00a0and 3677814\u00a0for patch details. No workaround is available<b>.<\/b><b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ffcc00;\"><b>7,5<\/b><\/span><b>\/ 10 <\/b><b>[<a id=\"OWA37e38544-36ba-bfec-1c15-a9cfef742cfc\" class=\"OWAAutoLink elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42940\">CVE-2025-42940<\/a>]<\/b><\/div>\n<\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (november):<\/p>\n<p class=\"elementToProof\"><b><a id=\"anchor-f7b36582-370d-7076-22d8-7662e15707a2\" class=\"OWAAutoLink\" title=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/november-2025.html\" href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/november-2025.html\">SAP Security Patch Day &#8211; November 2025<\/a><\/b><\/p>\n<p class=\"elementToProof\"><b><a id=\"anchor-a3d43147-20d1-218e-b6f3-1419a3688574\" class=\"OWAAutoLink\" title=\"https:\/\/onapsis.com\/blog\/sap-security-patch-day-november-2025\/\" href=\"https:\/\/onapsis.com\/blog\/sap-security-patch-day-november-2025\/\">SAP Patch Day: November 2025 &#8211; Onapsis<\/a><\/b><\/p>\n<p>&nbsp;<\/p>\n<p><strong style=\"color: #014888; font-family: inherit; font-size: 1.6rem; letter-spacing: 0em;\"><u>Resources affected<\/u><\/strong><\/p>\n<div class=\"w-post-elm post_content\">\n<p>The full list of affected systems\/components is as follows:<\/p>\n<div role=\"presentation\">\n<ul>\n<li><b>SQL Anywhere Monitor (Non-GUI)<\/b> \u2013 SYBASE_SQL_ANYWHERE_SERVER 17.0<\/li>\n<li><b>SAP NetWeaver AS Java<\/b> \u2013 SERVERCORE 7.50, ENGINEAPI 7.50, EP-BASIS 7.50, EP-RUNTIME 7.50<\/li>\n<li><b>SAP Solution Manager<\/b> \u2013 ST 720<\/li>\n<li><b>SAP CommonCryptoLib<\/b> \u2013 CRYPTOLIB 8<\/li>\n<li><b>SAP HANA JDBC Client<\/b> \u2013 HDB_CLIENT 2.0<\/li>\n<li><b>SAP Business Connector<\/b> \u2013 SAP BC 4.8<\/li>\n<li><b>SAP NetWeaver Enterprise Portal<\/b> \u2013 EP-BASIS 7.50, EP-RUNTIME 7.50<\/li>\n<li><b>SAP S\/4HANA (E-Recruiting BSP)<\/b> \u2013 S4ERECRT 100, 200, ERECRUIT 600, 603, 604, 605, 606, 616, 617, 800, 801, 802<\/li>\n<li><b>SAP HANA 2.0 (hdbrss)<\/b> \u2013 HDB 2.00<\/li>\n<li><b>SAP GUI for Windows<\/b> \u2013 BC-FES-GUI 8.00, 8.10<\/li>\n<li><b>SAP Starter Solution (PL SAFT)<\/b> \u2013 SAP_APPL 600, 602, 603, 604, 605, 606, 616, SAP_FIN 617, 618, 700, 720, 730, S4CORE 100, 101, 102, 103, 104<\/li>\n<li><b>SAP Business One (SLD)<\/b> \u2013 B1_ON_HANA 10.0, SAP-M-BO 10.0<\/li>\n<li><b>SAP S\/4HANA (Manage Journal Entries)<\/b> \u2013 S4CORE 104, 105, 106, 107, 108<\/li>\n<li><b>SAP NetWeaver Application Server for ABAP<\/b> \u2013 SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816<\/li>\n<li><b>SAP Fiori for SAP ERP<\/b>\u00a0\u2013 SAP_GWFND 740, 750, 751, 752, 753, 754, 755, 756, 757, 758<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. November 2025 Notes Summary and Highlights of the Month This month, the total number of notes was 20, which is 2 more than in the previous month. We had 3 Hot News this&#8230;<\/p>\n","protected":false},"author":6,"featured_media":13734,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[150],"class_list":["post-13732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2","tag-sap-notes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, November 2025 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from november 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, November 2025\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from november 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-13T09:50:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/Portada-Notas-SAP.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, November 2025\",\"datePublished\":\"2025-11-13T09:50:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/\"},\"wordCount\":875,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Portada-Notas-SAP.png\",\"keywords\":[\"SAP Notes\"],\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/\",\"name\":\"SAP Security Notes, November 2025 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Portada-Notas-SAP.png\",\"datePublished\":\"2025-11-13T09:50:57+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from november 2025, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Portada-Notas-SAP.png\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Portada-Notas-SAP.png\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-november-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, November 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, November 2025 - Inprosec","description":"All updates to SAP systems notes from november 2025, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, November 2025","og_description":"All updates to SAP systems notes from november 2025, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/","og_site_name":"Inprosec","article_published_time":"2025-11-13T09:50:57+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/Portada-Notas-SAP.png","type":"image\/png"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, November 2025","datePublished":"2025-11-13T09:50:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/"},"wordCount":875,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/Portada-Notas-SAP.png","keywords":["SAP Notes"],"articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/","name":"SAP Security Notes, November 2025 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/Portada-Notas-SAP.png","datePublished":"2025-11-13T09:50:57+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from november 2025, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/Portada-Notas-SAP.png","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/Portada-Notas-SAP.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-november-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, November 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=13732"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13732\/revisions"}],"predecessor-version":[{"id":13737,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13732\/revisions\/13737"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/13734"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=13732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=13732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=13732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}