{"id":8739,"date":"2023-03-16T11:33:54","date_gmt":"2023-03-16T09:33:54","guid":{"rendered":"http:\/\/inprosec.com\/?p=8739"},"modified":"2023-12-28T11:49:09","modified_gmt":"2023-12-28T09:49:09","slug":"sap-security-notes-march-2023","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/","title":{"rendered":"SAP Security Notes, March 2023"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<h2>March 2023 notes<\/h2>\n<h3>Summary and highlights of the month<\/h3>\n<p>The total number of notes\/patches was 21, 5 less than last month. The number of Hot News increased from 1 to 6 this month. On the other hand, it is worth noting that the number of high criticality notes decreases from 5 to 4. As usual we will leave the medium and low notes unchecked this month, but <strong>we will give details of a total of 7 notes<\/strong> (all those with a CVSS of 7 or higher).<\/p>\n<p>We have <strong>a total of 21 notes <\/strong>for the entire month (the 19 from Patch Tuesday, the 19 new ones, are 7 grades less than last month).<\/p>\n<p>We will review in detail the 4 high notes, the 4 are new and the 6 HotNews, 1 update and 5 new:<\/p>\n<ol>\n<li><strong>The most critical notes of the month (with CVSS <span style=\"color: #ff0000;\">9.9<\/span>)<\/strong> are 3 HotNews, one related to <strong>&#8220;Code Injection vulnerability in SAP Business Objects Business Intelligence Platform&#8221;<\/strong> and another related to <strong>&#8220;Improper Access Control in SAP NetWeaver AS for Java&#8221;<\/strong>, the third, is an update of a note released in December 2022 related to <strong>&#8220;Improper access control in SAP NetWeaver AS Java (User Defined Search)&#8221;.<\/strong><\/li>\n<li>Next in criticality (with <strong>CVSS <span style=\"color: #ff0000;\">9.6<\/span><\/strong> ) are 2 HotNews, one related to <strong>&#8220;Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform&#8221;<\/strong> and the other related to <strong>&#8220;Directory traversal vulnerability in SAP ERP and S4HANA&#8221;.<\/strong><\/li>\n<li>The next criticality score (with <strong>CVSS <span style=\"color: #ff0000;\">9.0<\/span><\/strong>) is another HotNews, related to<strong> &#8220;OS command execution vulnerability in SAP Business Objects Business Intelligence Platform&#8221;.<\/strong><\/li>\n<li>The next one is a high score (with <strong>CVSS <span style=\"color: #ff0000;\">8.8<\/span><\/strong>) related to <strong>&#8220;Arbitrary Code Execution in SAP Solution Manager and ABAP managed Systems&#8221;<\/strong>.<\/li>\n<li>The following criticality score (with<strong> CVSS <span style=\"color: #ff0000;\">8.7<\/span><\/strong>) is a high score related to <strong>&#8220;Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform&#8221;<\/strong>.<\/li>\n<li>The following criticality scores (with <strong>CVSS <span style=\"color: #b0b000;\">7.4<\/span><\/strong> and<span style=\"color: #b0b000;\"><strong> 7.2<\/strong><\/span>) are 2 high scores, the first one is a score related to <strong>&#8220;Multiple vulnerabilities in SAP NetWeaver AS for ABAP and ABAP Platform&#8221;<\/strong>, the other one is related to <strong>&#8220;Memory Corruption vulnerability in SAPOSCOL&#8221;<\/strong>.<\/li>\n<li>This month the most predominant type is &#8220;<strong>Improper Access Control in SAP NetWeaver<\/strong>&#8221; (4\/19 in patch day).<\/li>\n<\/ol>\n<p>In the graph (post March 2023 from SAP) we can see the ranking of the March notes in addition to the evolution and ranking of the last 5 previous months (only the notes of Sec. Tuesday \/ Patch Day &#8211; by SAP):<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-8741\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/notas-sap-marzo.jpg\" alt=\"Gr\u00e1fico de las notas SAP de marzo de 2023\" width=\"700\" height=\"368\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/notas-sap-marzo.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/notas-sap-marzo-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/notas-sap-marzo-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/notas-sap-marzo-600x315.jpg 600w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol>\n<li><strong><u>Code Injection vulnerability in SAP Business Objects Business Intelligence Platform (CMC) (3245526):<\/u><\/strong>\u00a0 In some scenarios, SAP Business Objects Business Intelligence Platform (CMC) Program Object execution can lead to code injection vulnerability which could allow an attacker to gain access to resources that are allowed by extra privileges. Successful attack could highly impact the confidentiality, Integrity, and Availability of the system. In addition to the solution provided by the patch upload the note contains a workaround. <strong>CVSS v3 Base Score: <span style=\"color: #ff0000;\">9,9<\/span> \/ 10 [CVE-2023-25616].<\/strong><\/li>\n<li><strong><u>Improper Access Control in SAP NetWeaver AS for Java (3285757):<\/u><\/strong> Due to missing authentication check, SAP NetWeaver Application Server for Java allows an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and services across systems. On a successful exploitation, the attacker can read and modify some sensitive information but can also be used to lock up any element or operation of the system making it unresponsive or unavailable. The solution provided by SAP interrupts public access to the LockingService by introducing the required authentication and authorization protection. <strong>CVSS v3 Base Score: <span style=\"color: #ff0000;\">9,9<\/span> \/ 10 [CVE-2023-23857].<\/strong><\/li>\n<li><strong><u>Update &#8211; Improper access control in SAP NetWeaver Process Integration (User Defined Search) (3273480<\/u><\/strong>): An\u00a0unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the\u00a0<em>User Defined Search (UDS) of SAP NetWeaver Process Integration (PI)<\/em>\u00a0and make use of an open naming and directory api to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access for user data, to make limited modifications to user data and to degrade performance of the system, leading to high impact on confidentiality and limited impact on availability and integrity of the application. This note has been re-released with updated &#8216;Causes &#8211; Side Effects&#8217; section. <strong>CVSS v3 Base Score: <span style=\"color: #ff0000;\">9,9<\/span> \/ 10 [CVE-2022-41272].<\/strong><\/li>\n<li><strong><u>Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform (3294595):<\/u><\/strong> SAP NetWeaver Application Server for ABAP and ABAP Platform allows an attacker with non-administrative authorizations to exploit a directory traversal flaw in an available service to overwrite the system files.\u00a0 In this attack, no data can be read but potentially critical OS files can be overwritten making the system unavailable. In addition to the solution provided by the patch upload the note contains a workaround. <strong>CVSS v3 Base Score: <span style=\"color: #ff0000;\">9,6<\/span> \/ 10 [CVE-2023-27269].<\/strong><\/li>\n<li><strong><u>Directory traversal vulnerability in SAP ERP and S4HANA (SAPRSBRO Program) (3302162): <\/u><\/strong>An attacker with non-administrative authorizations can exploit a directory traversal flaw in program SAPRSBRO to over-write system files. In this attack, no data can be read but potentially critical OS files can be over-written making the system unavailable. <strong>CVSS v3 Base Score: <span style=\"color: #ff0000;\">9,6<\/span> \/ 10 [CVE-2023-27269].<\/strong><\/li>\n<li><strong><u>OS command execution vulnerability in SAP Business Objects Business Intelligence Platform (Adaptive Job Server)(3283438): <\/u><\/strong>Due to incorrectly escaped parameters in Unix, SAP Business Objects Business Intelligence Platform (Adaptive Job Server) allows an authenticated attacker to execute arbitrary commands over the network. On successful exploitation, the attacker can completely compromise the application, causing high impact of confidentiality, integrity and availability of the application. In addition to the solution provided by the patch upload the note contains a workaround. <strong>CVSS v3 Base Score: <span style=\"color: #ff0000;\">9,0<\/span> \/ 10 [CVE-2023-25617].<\/strong><\/li>\n<li><strong><u>Arbitrary Code Execution in SAP Solution Manager and ABAP managed systems (ST-PI) (3296476): <\/u><\/strong>An attacker authenticated as a user with a non-administrative role and a common remote execution authorization can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attacker can read or modify any user or application data and can make the application unavailable, hence affecting the ABAP managed systems and SAP Solution Manager system. This vulnerability affects systems with Addon ST-PI due to an enhancement concept of AP Solution Manager, Custom Code Lifecycle Management. <strong>CVSS v3 Base Score: <span style=\"color: #ff0000;\">8,8<\/span> \/ 10 [CVE-2023-27893].<\/strong><\/li>\n<li><strong><u>Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform (3294954)<\/u><\/strong>: SAP NetWeaver AS for ABAP and ABAP Platform allows an attacker to exploit insufficient validation of path information provided by users, thus exploiting a directory traversal flaw in an available service to delete system files. In this attack, no data can be read but potentially critical OS files can be deleted making the system unavailable, causing significant impact on both availability and integrity. The problem arises because the input parameter dir_name in function EPS_SEEK_OUTPUT_FILE was not properly checked in case no content was fulfilled. <strong>CVSS v3 Base Score: <span style=\"color: #ff0000;\">8,7<\/span> \/ 10 [CVE-2023-27501]].<\/strong><\/li>\n<li><strong><u>Multiple vulnerabilities in SAP NetWeaver AS for ABAP and ABAP Platform (3296346): <\/u><\/strong>In SAP NetWeaver AS for ABAP and ABAP Platform, due to improper input controls an attacker authenticated as a non-administrative user can craft a request which will trigger the application server to send a request to an arbitrary url which can reveal, modify or make non-sensitive information unavailable, leading to low impact on Confidentiality, Integrity and Availability. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #cfcf00;\"><strong>7,4<\/strong> <\/span><strong>\/ 10 [CVE-2023-26459].<\/strong><\/li>\n<li>Memory <strong><u>Corruption vulnerability in SAPOSCOL (3275727): <\/u><\/strong>SAPOSCOL allows an unauthenticated attacker with network access to a server port assigned to the SAP Start Service to submit a crafted request which results in a memory corruption error. This error can be used to reveal but not modify any technical information about the server. It can also make a particular service temporarily unavailable. By this correction the length of input parameter values is checked. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #cfcf00;\"><strong>7,0<\/strong> <\/span><strong>\/ 10 [CVE-2023-27498].<\/strong><\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (March):<\/p>\n<p><a href=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&amp;rc=10\">Digital Library (sap.com)<\/a><\/p>\n<p><a href=\"https:\/\/onapsis.com\/blog\/sap-patch-day-march-2023\">SAP Patch Day: March 2023 | Onapsis<\/a><\/p>\n<h3 style=\"font-weight: 400;\"><strong><u>Resources affected<\/u><\/strong><\/h3>\n<div class=\"w-post-elm post_content\">\n<ul>\n<li>SAP Business Objects (Adaptive Job Server), Versions \u2013420, 430<\/li>\n<li>SAP Business Objects Business Intelligence Platform (CMC),Versions\u2013420, 430<\/li>\n<li>SAP Host Agent, Versions \u20137.22<\/li>\n<li>SAP NetWeaver Application Server for ABAP and ABAP Platform, Versions -700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791<\/li>\n<li>SAP NetWeaver AS for ABAP and ABAP Platform (SAPRSBRO Program), Versions \u2013700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757<\/li>\n<li>SAP NetWeaver AS for ABAP and ABAP Platform, Versions -SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791<\/li>\n<li>SAP NetWeaver AS for Java,Version \u20137.50<\/li>\n<li>SAP Solution Manager and ABAP managed systems(ST-PI), Versions -2008_1_700, 2008_1_710 and 740<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. March 2023 notes Summary and highlights of the month The total number of notes\/patches was 21, 5 less than last month. The number of Hot News increased from 1 to 6 this month&#8230;.<\/p>\n","protected":false},"author":6,"featured_media":8741,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[],"class_list":["post-8739","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, March 2023 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from March 2023, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, March 2023\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from March 2023, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-16T09:33:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-28T09:49:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/notas-sap-marzo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, March 2023\",\"datePublished\":\"2023-03-16T09:33:54+00:00\",\"dateModified\":\"2023-12-28T09:49:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/\"},\"wordCount\":1421,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/notas-sap-marzo.jpg\",\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/\",\"name\":\"SAP Security Notes, March 2023 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/notas-sap-marzo.jpg\",\"datePublished\":\"2023-03-16T09:33:54+00:00\",\"dateModified\":\"2023-12-28T09:49:09+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from March 2023, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/notas-sap-marzo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/notas-sap-marzo.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Gr\u00e1fico de las notas SAP de marzo de 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, March 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, March 2023 - Inprosec","description":"All updates to SAP systems notes from March 2023, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, March 2023","og_description":"All updates to SAP systems notes from March 2023, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/","og_site_name":"Inprosec","article_published_time":"2023-03-16T09:33:54+00:00","article_modified_time":"2023-12-28T09:49:09+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/notas-sap-marzo.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, March 2023","datePublished":"2023-03-16T09:33:54+00:00","dateModified":"2023-12-28T09:49:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/"},"wordCount":1421,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/notas-sap-marzo.jpg","articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/","name":"SAP Security Notes, March 2023 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/notas-sap-marzo.jpg","datePublished":"2023-03-16T09:33:54+00:00","dateModified":"2023-12-28T09:49:09+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from March 2023, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/notas-sap-marzo.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/notas-sap-marzo.jpg","width":1200,"height":630,"caption":"Gr\u00e1fico de las notas SAP de marzo de 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, March 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/8739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=8739"}],"version-history":[{"count":3,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/8739\/revisions"}],"predecessor-version":[{"id":9785,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/8739\/revisions\/9785"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/8741"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=8739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=8739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=8739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}