{"id":13804,"date":"2025-12-18T10:54:43","date_gmt":"2025-12-18T08:54:43","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=13804"},"modified":"2025-12-18T10:54:43","modified_gmt":"2025-12-18T08:54:43","slug":"sap-security-notes-december-2025","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/","title":{"rendered":"SAP Security Notes, December 2025"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<div>\n<h2><\/h2>\n<h2>December 2025 Notes<\/h2>\n<h3>Summary and Highlights of the Month<\/h3>\n<div>\n<div class=\"elementToProof\">\n<p>This month, the total number was 14 notes, 6 fewer than in the previous month. This month we had 3 Hot News, the same number as in the previous period. Regarding high-criticality notes, there are 5, a considerable increase compared to the previous period, since there was only one. Medium and low notes will not be reviewed, therefore <b>we will provide details for a total of 8 notes<\/b> (all those with a CVSS of <b>7<\/b> or higher).We have <b>a total of 14 notes<\/b> for the entire month (all 14 are new and there are no updates to notes published in previous months).<\/p>\n<p>We will review in detail a total of 8 notes, all of them high-criticality and Hot News:<\/p>\n<ol start=\"1\">\n<li>\n<div role=\"presentation\">The highest-criticality note of the month <b>(CVSS<\/b><b> <\/b><b>9.9<\/b><b>)<\/b> is a Hot News and is related to <b>&#8220;Code Injection vulnerability in SAP Solution Manager&#8221;.<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\">The next in terms of criticality <b>(CVSS<\/b><b> 9.6<\/b><b>)<\/b> is another Hot News, the second of the month, and is related to <b>&#8220;Multiple vulnerabilities in Apache Tomcat within SAP Commerce Cloud&#8221;<\/b>.<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">The next in terms of criticality <b>(CVSS<\/b><b> 9.1<\/b><b>)<\/b> is the last Hot News of the month, and is related to <b>&#8220;Deserialization Vulnerability in SAP jConnect &#8211; SDK for ASE&#8221;<\/b>.<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">The next in terms of criticality <b>(CVSS<\/b><b> 8.2<\/b><b>)<\/b> is the first high-criticality note, and it is related to <b>&#8220;Sensitive Data Exposure in SAP Web Dispatcher and Internet Communication Manager (ICM)&#8221;<\/b>.<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">The next in terms of criticality <b>(CVSS<\/b><b> 7.9<\/b><b>)<\/b> is the second high-criticality note, and it is related to <b>&#8220;Denial of service (DOS) in SAP NetWeaver (remote service for Xcelsius)&#8221;<\/b>.<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">The next in terms of criticality <b>(CVSS<\/b><b> 7.5<\/b><b>)<\/b> consist of 2 high-criticality notes, and they are related to <b>&#8220;Denial of service (DOS) in SAP Business Objects&#8221;<\/b> and <b>&#8220;Memory Corruption vulnerability in SAP Web Dispatcher, Internet Communication Manager and SAP Content Server&#8221;<\/b>.<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">The next in terms of criticality <b>(CVSS<\/b><b> 7.1<\/b><b>)<\/b> is the last high-criticality note we will analyze this month, and it is related to <b>&#8220;Missing Authorization Check in SAP S\/4 HANA Private Cloud (Financials General Ledger)&#8221;<\/b>.<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">This month, despite the significant decrease in the number of notes (one of the months with the lowest number of notes of the year), 57% of them have a criticality of 7 or higher, so they are quite relevant.<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">This month, the most predominant type has been <b>&#8220;Denial of service (DOS)&#8221; (3\/20 on patch day)<\/b>.<\/div>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>In the chart we can see the <b><u>classification of the December notes<\/u><\/b>, as well as the evolution and classification of the previous 5 months (only notes from Sec. Tuesday \/ Patch Day \u2013 by SAP):<\/p>\n<\/div>\n<\/div>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-13806\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/12\/notas-sap-diciembre-2025.jpg\" alt=\"\" width=\"801\" height=\"421\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/12\/notas-sap-diciembre-2025.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/12\/notas-sap-diciembre-2025-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/12\/notas-sap-diciembre-2025-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/12\/notas-sap-diciembre-2025-600x315.jpg 600w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol start=\"1\">\n<li>\n<div role=\"presentation\"><b>Code Injection vulnerability in SAP Solution Manager<\/b>\u00a0<b><u>(<\/u><\/b><b><a id=\"OWA63d06771-0347-7c89-e799-964203ed4259\" class=\"x_OWAAutoLink\" href=\"https:\/\/me.sap.com\/notes\/3685270\" data-auth=\"NotApplicable\">3685270<\/a><\/b><b><u>)<\/u>:<\/b>\u00a0SAP Solution Manager is affected by a command injection vulnerability\u00a0caused by missing input sanitization in a remote-enabled function module, allowing an authenticated attacker to inject malicious code and potentially gain full system control, resulting in high impact on confidentiality, integrity, and availability. The issue is resolved by introducing input sanitization that rejects most non-alphanumeric characters, and customers should apply the referenced Correction Instructions or Support Packages. No workaround is available<b>.<\/b><b>\u00a0CVSS v3\u00a0Base Score <\/b><b>9,9<\/b><b>\/ 10 <\/b><b>[<a id=\"OWA03ffd7cc-329e-009a-cc1f-488287212112\" class=\"x_OWAAutoLink\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42880\" data-auth=\"NotApplicable\">CVE-2025-42880<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Multiple vulnerabilities in Apache Tomcat within SAP Commerce Cloud <\/b><b><u>(<\/u><\/b><b><a id=\"OWAbcbeef14-7256-248b-16c8-be381875a875\" class=\"x_OWAAutoLink\" href=\"https:\/\/me.sap.com\/notes\/3683579\" data-auth=\"NotApplicable\">3683579<\/a><\/b><b><u>)<\/u>:<\/b>\u00a0SAP Commerce Cloud is exposed to two Apache Tomcat vulnerabilities\u2014console manipulation via crafted URLs and relative path traversal \u2014 due to shipping with affected Tomcat versions. If the prerequisites described in the CVEs are met, an attacker could compromise confidentiality, integrity, and availability. SAP resolves the issue by upgrading Tomcat to secure versions included in Patch Release 2205.45, Update Release 2211.47, and Update Release 2211-jdk21.5. Customers must download the updated releases from the SAP Support Portal, rebuild, and redeploy their environments following the respective Public Cloud or On-Premise deployment guidelines. No workaround is available. <b>CVSS v3\u00a0Base Score <\/b><b>9,6<\/b><b>\/ 10 <\/b> <b>[<a id=\"OWAa1027e8a-2e42-d948-aeb5-2e5e0a38cd5d\" class=\"x_OWAAutoLink\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-55754\" data-auth=\"NotApplicable\">CVE-2025-55754<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Deserialization Vulnerability in SAP jConnect &#8211; SDK for ASE<\/b><b>\u00a0(<\/b><b><a id=\"OWAacd5d5e4-e1cd-b4c6-24c5-3c2a0c71c661\" class=\"x_OWAAutoLink\" href=\"https:\/\/me.sap.com\/notes\/3685286\" data-auth=\"NotApplicable\">3685286<\/a><\/b><b>): <\/b>SAP jConnect contains a deserialization vulnerability that, under specific conditions, allows a high-privileged user to achieve remote code execution\u00a0by supplying specially crafted input. This results in a high impact on confidentiality, integrity, and availability. The issue stems from accepting unsupported or arbitrary user-controlled input without proper validation. SAP resolves the vulnerability by disabling serialization and deserialization of the affected input values within the jConnect JDBC driver and by restricting allowable values for the relevant connection property, thereby preventing RCE. Customers must upgrade to one of the corrected versions: SDK for SAP ASE 16.0 SP04 PL08\u00a0or SDK for SAP ASE 16.1 SP00 PL01 HF1. No workaround is available.<b>\u00a0CVSS v3\u00a0Base Score <\/b><b>9,1<\/b><b>\/ 10 <\/b><b>[<a id=\"OWAb8ecfa2e-b5be-f2df-c34f-d3e7d80acafa\" class=\"x_OWAAutoLink\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42928\" data-auth=\"NotApplicable\">CVE-2025-42928<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Sensitive Data Exposure in SAP Web Dispatcher and Internet Communication Manager (ICM)<\/b><b>\u00a0(<\/b><b><a id=\"OWA6a141002-fe71-3a6d-0615-dabce852b49d\" class=\"x_OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3684682\" href=\"https:\/\/me.sap.com\/notes\/3684682\" data-auth=\"NotApplicable\">3684682<\/a><\/b><b>): <\/b>SAP Web Dispatcher and ICM may expose internal testing interfaces through the icm\/HTTP\/icm_test_&lt;x&gt;\u00a0parameter, which is not intended for production use. If explicitly enabled, unauthenticated attackers could access internal diagnostics, send crafted requests, or disrupt services, resulting in high impact on confidentiality and availability and low impact on integrity. The vulnerability\u00a0affects standalone Web Dispatcher installations, the Web Dispatcher in SAP HANA XSC\/XSA, and ICM in SAP NetWeaver AS ABAP and Java. The fix requires manually removing all icm\/HTTP\/icm_test_&lt;x&gt;\u00a0parameters from DEFAULT and instance profiles (e.g., icm\/HTTP\/icm_test_0, icm\/HTTP\/icm_test_1, etc.) and then restarting the Web Dispatcher or application server. No workaround is available beyond applying the prescribed manual correction.<b>\u00a0CVSS v3\u00a0Base Score <\/b><b>8,2<\/b><b>\/ 10 <\/b><b>[<a id=\"OWAdf574a27-746c-ef58-3ab0-d7e9da8bab70\" class=\"x_OWAAutoLink\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42878\" data-auth=\"NotApplicable\">CVE-2025-42878<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Denial of service (DOS) in SAP NetWeaver (remote service for Xcelsius)<\/b><b>\u00a0(<\/b><b><a id=\"OWA73aa28e4-30ed-190f-3aeb-bca624c57d5f\" class=\"x_OWAAutoLink\" href=\"https:\/\/me.sap.com\/notes\/3640185\" data-auth=\"NotApplicable\">3640185<\/a><\/b><b>): <\/b>SAP NetWeaver\u2019s remote service for Xcelsius contains a vulnerability\u00a0that allows an attacker with network access and high privileges to execute arbitrary code due to insufficient input validation and improper handling of remote method calls. No user interaction is required. Successful exploitation can cause service disruption or unauthorized system control, resulting in high impact on integrity and availability, with no confidentiality impact. The fix removes the Xcelsius remote service entirely. Customers must apply the relevant Support Package or BI Java patch for SAP NetWeaver BI 7.50, as detailed in SAP Note 3539090 and associated delivery notes. Xcelsius itself is end-of-life, and this security note formally discontinues its remote service. A temporary workaround is available through manual steps provided in the note, but SAP strongly recommends applying the official corrections since the workaround is not a permanent solution.<b>\u00a0CVSS v3\u00a0Base Score <\/b><b>7,9<\/b><b>\/ 10 [<a id=\"OWA5dce1b2e-644c-9ad9-e00e-cf66eb8204b3\" class=\"x_OWAAutoLink\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42874\" data-auth=\"NotApplicable\">CVE-2025-42874<\/a>]<\/b><\/div>\n<div>\n<div role=\"presentation\"><b>\u00a0<\/b><\/div>\n<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Denial of service (DOS) in SAP Business Objects<\/b><b>\u00a0(<\/b><b><a id=\"OWAba8c8ca6-21fa-7242-d4fe-d375f3351d6c\" class=\"x_OWAAutoLink\" href=\"https:\/\/me.sap.com\/notes\/3650226\" data-auth=\"NotApplicable\">3650226<\/a><\/b><b>): <\/b>SAP Business Objects is vulnerable to denial-of-service attacks\u00a0due to improper request handling and insufficient resource management. An unauthenticated attacker can overload the service, causing long response delays or complete interruption, with no impact on confidentiality or integrity but a high impact on availability. The issue originates from third-party components that do not adequately restrict or manage incoming requests. The fix updates these components to secure, non-vulnerable versions that enforce stronger resource controls. Customers should apply the patches referenced in the \u201cSupport Packages &amp; Patches\u201d section of the security note and consult Knowledge Base Article 2144559 for the BI Platform maintenance strategy.<b>\u00a0CVSS v3\u00a0Base Score <\/b><b>7,5<\/b><b>\/\u00a010 [<a id=\"OWA7ee36018-4cac-8f00-aee1-c5482bb07bde\" class=\"x_OWAAutoLink\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-48976\" data-auth=\"NotApplicable\">CVE-2025-48976<\/a>]<\/b><\/div>\n<div>\n<div role=\"presentation\"><b>\u00a0<\/b><\/div>\n<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Memory Corruption vulnerability in SAP Web Dispatcher, Internet Communication Manager and SAP Content Server<\/b><b>\u00a0(<\/b><b><a id=\"OWA917f8bd4-1e21-2b16-f1cf-cebb601dec87\" class=\"x_OWAAutoLink\" href=\"https:\/\/me.sap.com\/notes\/3677544\" data-auth=\"NotApplicable\">3677544<\/a><\/b><b>): <\/b>SAP Web Dispatcher, ICM, and SAP Content Server contain a memory corruption vulnerability\u00a0caused by logical errors in internal memory handling. An unauthenticated attacker can exploit these flaws to trigger buffer overflows, heap corruption, and related issues, resulting in a high impact on system availability, though confidentiality and integrity remain unaffected. The issue affects ICM in SAP NetWeaver ABAP and Java, SAP Web Dispatcher in XSA versions below 1.4.0, and specific SAP Content Server releases listed in the note. The fix corrects the faulty memory logic and is delivered through updated kernel and component patches. Standalone and embedded Web Dispatchers, ICM, and Content Server must be patched using the appropriate kernel archives (SAPWEBDISP.SAR, dw.sar, SAPEXE.SAR, SAPEXEDB.SAR, SAPCS.SAR), following SAP\u2019s kernel update guidance and relevant notes. XSA systems must be upgraded to version 1.4.0 or later. As a consistent rule, only the latest kernel or Content Server patch level should be applied. No workaround exists.<b>\u00a0CVSS v3\u00a0Base Score <\/b><b>7,5<\/b><b>\/ 10 [<a id=\"OWA4cbc8f57-e14c-497b-6f5d-a15b85f29179\" class=\"x_OWAAutoLink\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42877\" data-auth=\"NotApplicable\">CVE-2025-42877<\/a>]<\/b><\/div>\n<div>\n<div role=\"presentation\"><b>\u00a0<\/b><\/div>\n<\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Missing Authorization Check in SAP S\/4 HANA Private Cloud (Financials General Ledger)<\/b><b>\u00a0(<\/b><b><a id=\"OWA99b01116-27fc-bdd5-842c-815016dba71b\" class=\"x_OWAAutoLink\" href=\"https:\/\/me.sap.com\/notes\/3672151\" data-auth=\"NotApplicable\">3672151<\/a><\/b><b>): <\/b>This vulnerability in SAP S\/4HANA Private Cloud (Financials General Ledger) results from a programming error introduced in ECS logic, causing missing authorization checks. An authenticated attacker restricted to a single company code could improperly read sensitive data or create and modify documents across all\u00a0company codes, posing a high confidentiality\u00a0and low integrity\u00a0impact, with no effect on availability. The fix enforces correct authorization validation, and customers should apply the referenced correction instructions or support packages to fully remediate the issue. A temporary workaround is available via functional SAP Note 3673002, but SAP strongly recommends implementing the permanent corrections as soon as possible.<b>\u00a0CVSS v3\u00a0Base Score <\/b><b>7,1<\/b><b>\/ 10 [<a id=\"OWA443c9963-abba-1ff1-a554-bcf8bff943d1\" class=\"x_OWAAutoLink\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42876\" data-auth=\"NotApplicable\">CVE-2025-42876<\/a>]<\/b><\/div>\n<\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (december):<\/p>\n<p><b><a id=\"anchor-47788763-6fa0-5ff4-c6de-72281bd22873\" class=\"OWAAutoLink\" title=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/december-2025.html\" href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/december-2025.html\">SAP Security Patch Day &#8211; December 2025<\/a><\/b><\/p>\n<p><b><a id=\"anchor-694e62b3-63b8-7445-dfa4-d2d9a331ad8d\" class=\"OWAAutoLink\" title=\"https:\/\/onapsis.com\/blog\/sap-security-patch-day-december-2025\/\" href=\"https:\/\/onapsis.com\/blog\/sap-security-patch-day-december-2025\/\">SAP Patch Day: December 2025 &#8211; Onapsis<\/a><\/b><\/p>\n<p>&nbsp;<\/p>\n<p><strong style=\"color: #014888; font-family: inherit; font-size: 1.6rem; letter-spacing: 0em;\"><u>Resources affected<\/u><\/strong><\/p>\n<div class=\"w-post-elm post_content\">\n<p>The full list of affected systems\/components is as follows:<\/p>\n<div role=\"presentation\">\n<ul>\n<li><b>SAP Solution Manager\u00a0\u2013<\/b> ST 720<\/li>\n<li><b>SAP Commerce Cloud\u00a0\u2013 <\/b>HY_COM 2205, COM_CLOUD 2211, COM_CLOUD 2211-JDK21<\/li>\n<li><b>SAP jConnect \u2013 SDK for ASE\u00a0\u2013 <\/b>SYBASE_SOFTWARE_DEVELOPER_KIT 16.0.4, 16.1<\/li>\n<li><b>SAP Web Dispatcher and Internet Communication Manager (ICM)\u00a0\u2013<\/b> KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, 7.54, 7.77, 7.89, 7.93, 9.16, WEBDISP 7.22_EXT, 7.53, 7.54, XS_ADVANCED_RUNTIME 1.00, SAP_EXTENDED_APP_SERVICES 1, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.16<\/li>\n<li><b>SAP NetWeaver (remote service for Xcelsius)\u00a0\u2013 <\/b>BI-BASE-E 7.50, BI-BASE-B 7.50, BI-IBC 7.50, BI-BASE-S 7.50, BIWEBAPP 7.50<\/li>\n<li><b>SAP Business Objects\u00a0\u2013 <\/b>ENTERPRISE 430, 2025, 2027<\/li>\n<li><b>SAP Web Dispatcher, Internet Communication Manager and SAP Content Server\u00a0\u2013<\/b> KRNL64UC 7.53, WEBDISP 7.53, 7.54, XS_ADVANCED_RUNTIME 1.00, SAP_EXTENDED_APP_SERVICES 1, CONTSERV 7.53, 7.54, KERNEL 7.53, 7.54<\/li>\n<li><b>SAP S\/4 HANA Private Cloud (Financials General Ledger)\u00a0\u2013<\/b> S4CORE 104, 105, 106, 107, 108, 109<\/li>\n<li><b>SAP NetWeaver Internet Communication Framework\u00a0\u2013 <\/b>SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758<\/li>\n<li><b>Application Server ABAP\u00a0\u2013<\/b> KRNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, 7.93, 9.16, 9.17<\/li>\n<li><b>SAP NetWeaver Enterprise Portal\u00a0\u2013 <\/b>EP-RUNTIME 7.50<\/li>\n<li><b>SAPUI5 framework (Markdown-it component)\u00a0\u2013<\/b> SAP_UI 755, 756, 757, 758<\/li>\n<li><b>SAP Enterprise Search for ABAP\u00a0\u2013 <\/b>SAP_BASIS 752, 753, 754, 755, 756, 757, 758, 816<\/li>\n<li><b>SAP BusinessObjects Business Intelligence Platform\u00a0\u2013 <\/b>ENTERPRISE 430, 2025, 2027<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. December 2025 Notes Summary and Highlights of the Month This month, the total number was 14 notes, 6 fewer than in the previous month. This month we had 3 Hot News, the same&#8230;<\/p>\n","protected":false},"author":6,"featured_media":13806,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[150],"class_list":["post-13804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2","tag-sap-notes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, December 2025 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from december 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, December 2025\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from december 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-18T08:54:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/12\/notas-sap-diciembre-2025.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, December 2025\",\"datePublished\":\"2025-12-18T08:54:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/\"},\"wordCount\":1646,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/notas-sap-diciembre-2025.jpg\",\"keywords\":[\"SAP Notes\"],\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/\",\"name\":\"SAP Security Notes, December 2025 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/notas-sap-diciembre-2025.jpg\",\"datePublished\":\"2025-12-18T08:54:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from december 2025, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/notas-sap-diciembre-2025.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/notas-sap-diciembre-2025.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-december-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, December 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, December 2025 - Inprosec","description":"All updates to SAP systems notes from december 2025, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, December 2025","og_description":"All updates to SAP systems notes from december 2025, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/","og_site_name":"Inprosec","article_published_time":"2025-12-18T08:54:43+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/12\/notas-sap-diciembre-2025.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, December 2025","datePublished":"2025-12-18T08:54:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/"},"wordCount":1646,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/12\/notas-sap-diciembre-2025.jpg","keywords":["SAP Notes"],"articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/","name":"SAP Security Notes, December 2025 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/12\/notas-sap-diciembre-2025.jpg","datePublished":"2025-12-18T08:54:43+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from december 2025, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/12\/notas-sap-diciembre-2025.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/12\/notas-sap-diciembre-2025.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-december-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, December 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=13804"}],"version-history":[{"count":2,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13804\/revisions"}],"predecessor-version":[{"id":13809,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13804\/revisions\/13809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/13806"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=13804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=13804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=13804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}