{"id":14338,"date":"2026-03-12T10:36:12","date_gmt":"2026-03-12T08:36:12","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=14338"},"modified":"2026-03-12T10:36:12","modified_gmt":"2026-03-12T08:36:12","slug":"sap-security-notes-march-2026","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/","title":{"rendered":"SAP Security Notes, March 2026"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<div>\n<h2><\/h2>\n<h2>March 2026 Notes<\/h2>\n<h3>Monthly Summary and Highlights<\/h3>\n<div>\n<div class=\"elementToProof\">\n<div class=\"elementToProof\">This month the total number has been <b>15 notes<\/b> (all new, with no updates), 12 fewer than in February. This month 2 Hot News were published, the same number as in the previous period. Regarding high-priority notes, there is 1, six fewer compared to February. Medium and low priority notes will not be reviewed, so we will provide details for a total of <b>3 notes<\/b> (all those with a CVSS of 7 or higher).<\/div>\n<div><\/div>\n<div class=\"elementToProof\">We have a total of <b>15 notes<\/b> for the whole month (all 15 are new and there are no updates to notes from previous months).<\/div>\n<div><\/div>\n<div class=\"elementToProof\">We will review in detail a total of 3 notes, all of them high-priority and Hot News:<\/div>\n<ol start=\"1\" data-path-to-node=\"9\">\n<li>\n<div class=\"elementToProof\" role=\"presentation\">The most critical note of the month <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>9.8<\/b><\/span><b>)<\/b> is a Hot News and is related to <b>&#8220;Code Injection vulnerability in SAP Quotation Management Insurance application (FS-QUO)&#8221;.<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">The next in terms of criticality <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>9.1<\/b><\/span><b>)<\/b> is the second Hot News of the month and is related to <b>&#8220;Insecure Deserialization in SAP NetWeaver Enterprise Portal Administration&#8221;.<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">The last note we will review <b>(CVSS <\/b><span style=\"color: #ff9900;\"><b>7.7<\/b><\/span><b>)<\/b> is high-priority and concerns <b>&#8220;Denial of Service (DoS) in SAP Supply Chain Management&#8221;.<\/b><\/div>\n<\/li>\n<\/ol>\n<div class=\"elementToProof\">This month the most predominant type once again was <b>&#8220;Missing Authorization Check&#8221;<\/b> (6\/15 in the Patch Day).<\/div>\n<div class=\"elementToProof\">In the chart we can see the classification of the March notes, as well as the evolution and classification of the previous 5 months (only the Sec. Tuesday \/ Patch Day notes \u2013 by SAP):<\/div>\n<\/div>\n<\/div>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-14340\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/03\/Notas-SAP-marzo.jpg\" alt=\"\" width=\"700\" height=\"368\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/03\/Notas-SAP-marzo.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/03\/Notas-SAP-marzo-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/03\/Notas-SAP-marzo-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/03\/Notas-SAP-marzo-600x315.jpg 600w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol start=\"1\">\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Code Injection vulnerability in SAP CRM and SAP S\/4HANA (Scripting Editor) (<a id=\"OWA59bbba05-f998-721a-a9ee-4e3995dcb966\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3697099\" href=\"https:\/\/me.sap.com\/notes\/3697099\" data-linkindex=\"0\" data-auth=\"NotApplicable\">3697099<\/a>):<\/b>\u00a0An authenticated attacker in SAP CRM and SAP S\/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. This leads to a full database compromise with high impact on confidentiality, integrity, and availability. A temporary workaround is available. <b>CVSS v3 Base Score <\/b><span style=\"color: #ff0000;\"><b>9,9<\/b><\/span><b>\/10 [<a id=\"OWAdfdd9bee-586d-06c7-445f-1b9551c5b23a\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-0488\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-0488\" data-linkindex=\"1\" data-auth=\"NotApplicable\">CVE-2026-0488<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Missing Authorization check in SAP NetWeaver Application Server ABAP and ABAP Platform (<a id=\"OWAb944462b-bcda-a988-df81-19dad851fc3b\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3674774\" href=\"https:\/\/me.sap.com\/notes\/3674774\" data-linkindex=\"2\" data-auth=\"NotApplicable\">3674774<\/a>):<\/b>\u00a0SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on integrity and availability, and no impact on the confidentiality of the application. <b>CVSS v3 Base Score <\/b> <span style=\"color: #ff0000;\"><b>9,6<\/b><\/span><b>\/10 [<a id=\"OWAb5c3c9a8-00e4-b843-bd54-bcd6aef3b26c\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-0509\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-0509\" data-linkindex=\"3\" data-auth=\"NotApplicable\">CVE-2026-0509<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>XML Signature Wrapping in SAP NetWeaver AS ABAP and ABAP Platform (<a id=\"OWA54b81082-b06b-1878-5b93-7cf92b15df9e\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3697567\" href=\"https:\/\/me.sap.com\/notes\/3697567\" data-linkindex=\"4\" data-auth=\"NotApplicable\">3697567<\/a>):<\/b>\u00a0SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered identity information, unauthorized access to sensitive user data and potential disruption of normal system usage. A temporary workaround is available. <b>CVSS v3 Base Score <\/b><span style=\"color: #ff9900;\"><b>8,8<\/b><\/span><b>\/10 [<a id=\"OWAf2fd97af-55a6-b138-3253-3f56a39c1b70\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-23687\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-23687\" data-linkindex=\"5\" data-auth=\"NotApplicable\">CVE-2026-23687<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Denial of service (DOS) in SAP Supply Chain Management (<a id=\"OWA32d8ab49-1ffa-ded8-6521-57a04bb13f29\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3703092\" href=\"https:\/\/me.sap.com\/notes\/3703092\" data-linkindex=\"6\" data-auth=\"NotApplicable\">3703092<\/a>):<\/b>\u00a0Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled\u00a0function module with an excessively large loop-control parameter. This triggers prolonged loop execution that consumes excessive system resources, potentially rendering the system unavailable. Successful exploitation\u00a0results in a denial-of-service condition that impacts availability, while confidentiality and integrity remain unaffected. <b>CVSS v3 Base Score <\/b><span style=\"color: #ff9900;\"><b>7,7<\/b><\/span><b>\/10 [<a id=\"OWA0289f163-c9ae-3a8f-fcdf-3f875582c8bf\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-23689\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-23689\" data-linkindex=\"7\" data-auth=\"NotApplicable\">CVE-2026-23689<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Missing Authorization check in SAP Solution Tools Plug-In (ST-PI) (<a id=\"OWAfe6de416-0d8b-22fe-01b5-e5f35acc4473\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3705882\" href=\"https:\/\/me.sap.com\/notes\/3705882\" data-linkindex=\"8\" data-auth=\"NotApplicable\">3705882<\/a>):<\/b>\u00a0SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality and does not affect integrity or availability. <b>CVSS v3 Base Score <\/b><span style=\"color: #ff9900;\"><b>7,7<\/b><\/span><b>\/10 [<a id=\"OWA6488059c-d27c-1d57-6b8e-0a0e12933baa\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-24322\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-24322\" data-linkindex=\"9\" data-auth=\"NotApplicable\">CVE-2026-24322<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Denial of service (DOS) in SAP BusinessObjects BI Platform (<a id=\"OWA4d17ba1c-5a06-a2c1-d72e-c6c9e7ef4a1d\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3654236\" href=\"https:\/\/me.sap.com\/notes\/3654236\" data-linkindex=\"10\" data-auth=\"NotApplicable\">3654236<\/a>):<\/b>\u00a0SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. As a result, it has a high impact on the availability but no impact on the confidentiality and integrity. A temporary workaround is available. <b>CVSS v3 Base Score <\/b><span style=\"color: #ff9900;\"><b>7,5<\/b><\/span><b>\/10 [<a id=\"OWAbc8315e0-d2ba-ec33-b3bf-d9437b9b0e04\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-0490\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-0490\" data-linkindex=\"11\" data-auth=\"NotApplicable\">CVE-2026-0490<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Denial of service (DOS) vulnerability in SAP BusinessObjects BI Platform (<a id=\"OWA0864a8cb-840f-b788-d203-ab1890b9b38c\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3678282\" href=\"https:\/\/me.sap.com\/notes\/3678282\" data-linkindex=\"12\" data-auth=\"NotApplicable\">3678282<\/a>):<\/b>\u00a0SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted requests that could cause the Content Management Server (CMS) to crash and automatically restart. By repeatedly submitting these requests, the attacker could induce a persistent service disruption, rendering the CMS completely unavailable. Successful exploitation results in a high impact on availability, while confidentiality and integrity remain unaffected. A temporary workaround is available. <b>CVSS v3 Base Score <\/b><span style=\"color: #ff9900;\"><b>7,5<\/b><\/span><b>\/10 [<a id=\"OWAadf3730d-215c-08a4-a31b-43717d48248a\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord\/SearchResults?query=CVE-2026-0485\" href=\"https:\/\/www.cve.org\/CVERecord\/SearchResults?query=CVE-2026-0485\" data-linkindex=\"13\" data-auth=\"NotApplicable\">CVE-2026-0485<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Race Condition\u00a0in SAP Commerce Cloud (<a id=\"OWA86acab6c-ed3c-cbf2-0b03-8b9dbeeb7bb0\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3692405\" href=\"https:\/\/me.sap.com\/notes\/3692405\" data-linkindex=\"14\" data-auth=\"NotApplicable\">3692405<\/a>):<\/b>\u00a0Under certain conditions, SAP Commerce Cloud allows an authenticated user to bypass SSL trust validation for outbound connections due to a race condition in the Eclipse Jersey library (CVE-2025-12383), leading to a High impact on confidentiality and integrity, and no impact on the availability of the application. <b>CVSS v3 Base Score <\/b><span style=\"color: #ff9900;\"><b>7,4<\/b><\/span><b>\/10 [<a id=\"OWA83c62624-7bf5-e889-1bfd-4e752f4a9626\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-12383\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-12383\" data-linkindex=\"15\" data-auth=\"NotApplicable\">CVE-2025-12383<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Open Redirect vulnerability in SAP BusinessObjects Business Intelligence Platform (<a id=\"OWA07a5f163-b518-47d2-b975-2485af6d0b8d\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3674246\" href=\"https:\/\/me.sap.com\/notes\/3674246\" data-linkindex=\"16\" data-auth=\"NotApplicable\">3674246<\/a>):<\/b>\u00a0The SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker with high privileges to insert malicious URL within the application. Upon successful exploitation, the victim may click on this malicious URL, resulting in an unvalidated redirect to the attacker-controlled domain and subsequently download the malicious content. This vulnerability has a high impact on the confidentiality and integrity of the application, with no effect on the availability of the application. <b>CVSS v3 Base Score <\/b><span style=\"color: #ff9900;\"><b>7,3<\/b><\/span><b>\/10 [<a id=\"OWA8ee3ea9c-a842-9ee0-1e9a-8caaea9744c0\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-0508\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-0508\" data-linkindex=\"17\" data-auth=\"NotApplicable\">CVE-2026-0508<\/a>]<\/b><\/div>\n<\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (March):<\/p>\n<ul data-path-to-node=\"29\">\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b><a id=\"OWA0fdefd66-45bb-dade-f328-e2e0bbff2931\" class=\"OWAAutoLink\" title=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/february-2026.html\" href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/february-2026.html\" data-linkindex=\"18\" data-auth=\"NotApplicable\">SAP Security Patch Day &#8211; February 2026<\/a><\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b><a id=\"OWAa1047112-6722-9510-a2f5-10f10b714208\" class=\"OWAAutoLink\" title=\"https:\/\/onapsis.com\/blog\/sap-security-notes-february-2026-patch-day\/\" href=\"https:\/\/onapsis.com\/blog\/sap-security-notes-february-2026-patch-day\/\" data-linkindex=\"19\" data-auth=\"NotApplicable\">SAP Patch Day: February 2026 &#8211; Onapsis<\/a><\/b><\/div>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong style=\"color: #014888; font-family: inherit; font-size: 1.6rem; letter-spacing: 0em;\"><u>Resources affected<\/u><\/strong><\/p>\n<div class=\"w-post-elm post_content\">\n<p>The full list of affected systems\/components is as follows:<\/p>\n<div role=\"presentation\">\n<ul data-path-to-node=\"32\">\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>SAP CRM and SAP S\/4HANA (Scripting Editor):<\/b>\u00a0S4FND 102-109, SAP_ABA 700, WEBCUIF 700, 701, 730, 731, 746, 747, 748, 800, 801<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>SAP NetWeaver Application Server ABAP and ABAP Platform:<\/b>\u00a0KRNL64NUC 7.22, KRNL64UC 7.22, 7.53, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.16, 9.18, 9.19; SAP_BASIS 700-702, 731, 740, 750-758, 804, 816, 916-918<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>SAP Supply Chain Management:<\/b>\u00a0SCMAPO 713, 714, SCM 700, 701, 702, 712<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>SAP Solution Tools Plug-In (ST-PI):<\/b>\u00a0ST-PI 2008_1_700, 2008_1_710, 740, 758<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>SAP BusinessObjects BI Platform:<\/b>\u00a0ENTERPRISE 430, 2025, 2027<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>SAP Commerce Cloud:<\/b>\u00a0HY_COM 2205, COM_CLOUD 2211, COM_CLOUD 2211-JDK21<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. March 2026 Notes Monthly Summary and Highlights This month the total number has been 15 notes (all new, with no updates), 12 fewer than in February. This month 2 Hot News were published,&#8230;<\/p>\n","protected":false},"author":6,"featured_media":14340,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[150],"class_list":["post-14338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2","tag-sap-notes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, March 2026 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from march 2026, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, March 2026\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from march 2026, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-12T08:36:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/03\/Notas-SAP-marzo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, March 2026\",\"datePublished\":\"2026-03-12T08:36:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/\"},\"wordCount\":1013,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Notas-SAP-marzo.jpg\",\"keywords\":[\"SAP Notes\"],\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/\",\"name\":\"SAP Security Notes, March 2026 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Notas-SAP-marzo.jpg\",\"datePublished\":\"2026-03-12T08:36:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from march 2026, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Notas-SAP-marzo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Notas-SAP-marzo.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, March 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, March 2026 - Inprosec","description":"All updates to SAP systems notes from march 2026, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, March 2026","og_description":"All updates to SAP systems notes from march 2026, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/","og_site_name":"Inprosec","article_published_time":"2026-03-12T08:36:12+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/03\/Notas-SAP-marzo.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, March 2026","datePublished":"2026-03-12T08:36:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/"},"wordCount":1013,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/03\/Notas-SAP-marzo.jpg","keywords":["SAP Notes"],"articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/","name":"SAP Security Notes, March 2026 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/03\/Notas-SAP-marzo.jpg","datePublished":"2026-03-12T08:36:12+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from march 2026, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/03\/Notas-SAP-marzo.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/03\/Notas-SAP-marzo.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, March 2026"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/14338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=14338"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/14338\/revisions"}],"predecessor-version":[{"id":14344,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/14338\/revisions\/14344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/14340"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=14338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=14338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=14338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}