{"id":9966,"date":"2024-01-17T11:13:28","date_gmt":"2024-01-17T09:13:28","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=9966"},"modified":"2024-01-17T11:16:14","modified_gmt":"2024-01-17T09:16:14","slug":"sap-security-notes-january-2024","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/","title":{"rendered":"SAP Security Notes, January 2024"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<h2>January 2024 notes<\/h2>\n<h3>Summary and highlights of the month<\/h3>\n<p>The total number of notes\/patches this month was 12, which is 5 less than last month. The number of Hot News was 3, 1 less than last month. It&#8217;s also important to note that the number of high criticality notes remains the same as last month: 4 this month. As usual, we will leave the medium and low severity notes unreviewed, but we will <strong>detail a total of 7 notes<\/strong> (all those with a CVSS of <span style=\"color: #cccc00;\">7<\/span> or higher).<\/p>\n<p>We have a total of 12 notes for the entire month (the 12 from Patch Tuesday, 10 new and 2 updates, which are 5 notes fewer than the previous Patch Tuesday).<\/p>\n<p>We will review in detail a total of 7 notes, the 3 HotNews of this month, 2 new and 1 update, and the 4 high notes, all 4 new (those with a CVSS score equal to or greater than<span style=\"color: #cccc00;\"> 7<\/span>).<\/p>\n<ul>\n<li><strong>The most critical notes of the month (with a CVSS of <span style=\"color: #ff0000;\">9,1<\/span>)<\/strong> are 3 HotNews, 2 new and one update, one related to &#8220;<strong>Escalation of Privileges in SAP Business Technology Platform (BTP) Security Services Integration Libraries&#8221;, another with &#8220;Escalation of Privileges in applications developed through SAP Business Application Studio, SAP Web IDE Full-Stack and SAP Web IDE for SAP HANA<\/strong>&#8221; and the third with &#8220;<strong>Escalation of Privileges in SAP Edge Integration Cell<\/strong>&#8220;.<\/li>\n<li>The next in criticality (with a <strong>CVSS of <span style=\"color: #ff0000;\">8,4<\/span><\/strong>), is a high note related to &#8220;<strong>Code Injection vulnerability in SAP Application Interface Framework (File Adapter)<\/strong>&#8220;.<\/li>\n<li>The next in criticality (with a <strong>CVSS of <span style=\"color: #cccc00;\">7,5<\/span><\/strong>) is a high note related to &#8220;<strong>Denial of service (DOS) in SAP Web Dispatcher, SAP NetWeaver Application server ABAP, and ABAP Platform<\/strong>&#8220;.<\/li>\n<li>The following in criticality (with<strong> CVSS of <span style=\"color: #cccc00;\">7,3 <\/span>and <span style=\"color: #cccc00;\">7,3<\/span> respectively<\/strong>) are related to &#8220;<strong>Information disclosure vulnerability in Microsoft Edge browser extension (SAP GUI connector for Microsoft Edge)<\/strong>&#8221; and &#8220;<strong>Improper Authorization check in SAP LT Replication Server<\/strong>&#8220;.<\/li>\n<li>This month, the most predominant type is related to &#8220;<strong>Escalation of Privileges<\/strong>&#8221; (3\/12 on patch day).<\/li>\n<\/ul>\n<p>In the graph, we can see the<span style=\"text-decoration: underline;\"><strong> classification of the January notes<\/strong><\/span>, as well as the evolution and classification of the last 5 months (only the notes from Sec. Tuesday \/ Patch Day \u2013 by SAP).<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-9968 \" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/01\/Notas-SAP-enero-2024.jpg\" alt=\"\" width=\"800\" height=\"418\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/01\/Notas-SAP-enero-2024.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/01\/Notas-SAP-enero-2024-300x157.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/01\/Notas-SAP-enero-2024-1024x535.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/01\/Notas-SAP-enero-2024-600x314.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol>\n<li><strong><u>Escalation of Privileges in applications developed through SAP Business Application Studio, SAP Web IDE Full-Stack and SAP Web IDE for SAP HANA (3412456): <\/u><\/strong>Under certain conditions, node.js applications created through SAP Business Application Studio,\u00a0SAP Web IDE Full-Stack\u00a0and\u00a0SAP Web IDE for SAP HANA:, which are intended to be deployed in the SAP BTP or Cloud Foundry environment allow an escalation of privileges. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>9,1<\/strong><\/span><strong>\/ 10 [CVE-2023-49583].<\/strong><\/li>\n<li><strong><u>Escalation of Privileges in SAP Edge Integration Cell Related CVEs (3413475): <\/u><\/strong>SAP BTP Security Services Integration Libraries and Programming Infrastructures using these libraries listed below allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>9,1<\/strong><\/span><strong>\/ 10 (Multiple CVE\u00b4s).<\/strong><\/li>\n<li><strong><u>Update &#8211; Escalation of Privileges in SAP Business Technology Platform (BTP) Security Services Integration Libraries (3411067):<\/u><\/strong>SAP BTP\u00a0Security Services Integration Libraries and Programming Infrastructures using these libraries listed below allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>9,1<\/strong><\/span><strong><span style=\"color: #ff0000;\">\u00a0<\/span>\/ 10\u00a0(Multiple CVE\u00b4s).<\/strong><\/li>\n<li><strong><u>Code Injection vulnerability in SAP Application Interface Framework (File Adapter) (3411869<\/u><\/strong><strong>)<\/strong>: In SAP Application Interface Framework File Adapter, a user with elevated privileges can use a function module to traverse multiple layers and execute operating system commands directly, being able to control the behavior of the application, impacting confidentiality, integrity and availability. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>8,4<\/strong><\/span><strong>\/ 10 [CVE-2024-21737].<\/strong><\/li>\n<li><strong><u>Denial of service (DOS) in SAP Web Dispatcher, SAP NetWeaver Application server ABAP, and ABAP Platform (3389917):<\/u><\/strong>NetWeaver Application Server ABAP, and ABAP Platform allow an unauthenticated user to perform a DOS attack. This action may lead to flooding the memory and cause a high impact on the availability of the application. The vulnerability affects only the HTTP\/2 protocol. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #cccc00;\"><strong>7,5<\/strong><\/span><strong><span style=\"color: #cccc00;\">\u00a0<\/span>\/ 10 [CVE-2023-44487].<\/strong><\/li>\n<li><strong><u>Information Disclosure vulnerability in Microsoft Edge browser extension (SAP GUI connector for Microsoft Edge) (3386378): \u00a0<\/u><\/strong>Under certain conditions the Microsoft Edge browser extension (SAP GUI connector for Microsoft Edge)\u00a0allows an attacker to access highly sensitive information which would otherwise be restricted causing high impact on confidentiality.<strong>CVSS v3 Base Score: <\/strong><span style=\"color: #cccc00;\"><strong>7,4<\/strong><\/span><strong><span style=\"color: #cccc00;\">\u00a0<\/span>\/ 10 [CVE-2024-22125].<\/strong><\/li>\n<li><strong><u>Improper Authorization check in SAP LT Replication Server (3407617): <\/u><\/strong>SAP LT Replication Server does not perform the required authorization checks. This could allow an attacker with elevated privileges to perform unwanted actions. This issue may occur for SAP LT Replication Server running on SAP S\/4HANA 1809 to 2023. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #cccc00;\"><strong>7,3<\/strong><\/span><strong>\/ 10 [CVE-2024-21735].<\/strong><\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (January):<\/p>\n<p><u><a href=\"https:\/\/ddec1-0-en-ctp.trendmicro.com\/wis\/clicktime\/v1\/query?url=https%3a%2f%2fdam.sap.com%2fmac%2fapp%2fe%2fpdf%2fpreview%2fembed%2fucQrx6G%3fltr%3da%26rc%3d10&amp;umid=8780927f-e301-4dbb-b956-0ee07e663535&amp;auth=708978c2440d0c6de95dfde6471e502ec413f9a9-7b931f29de852470f9891be8f0e84f4998e8e703\"><span lang=\"EN-GB\">Digital Library (sap.com)<\/span><\/a><\/u><\/p>\n<p><a href=\"https:\/\/onapsis.com\/blog\/sap-patch-day-january-2024\"><span lang=\"EN-GB\">SAP Patch Day: January 2024 | Onapsis<\/span><\/a><\/p>\n<h3 style=\"font-weight: 400;\"><strong><u>Resources affected<\/u><\/strong><\/h3>\n<div class=\"w-post-elm post_content\">\n<ul>\n<li>@sap\/approuter, Versions \u201314.4.2<\/li>\n<li>@sap\/xssec, Versions \u2013&lt; 3.6.0<\/li>\n<li>cloud-security-services-integration-library, Versions \u2013&lt; 2.17.0 &amp; from 3.0.0 before 3.3.0<\/li>\n<li>github.com\/sap\/cloud-security-client-go, Versions -&lt; 0.17.0<\/li>\n<li>Microsoft Edge browser extension (SAP GUI connector for Microsoft Edge),Version -1.0<\/li>\n<li>SAP Application Interface Framework (File Adapter), Version \u2013702<\/li>\n<li>SAP Edge Integration Cell, Versions &gt;= 8.9.13<\/li>\n<li>SAP LT Replication Server,Versions\u2013S4CORE 103, S4CORE 104, S4CORE 105, S4CORE 106, S4CORE 107, S4CORE 108<\/li>\n<li>SAP NetWeaver AS ABAP and ABAP Platform, Versions-KRNL64UC 7.53, KERNEL 7.53, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.94, KERNEL 7.93, KERNEL 7.95<\/li>\n<li>SAP Web Dispatcher, Versions\u2013WEBDISP 7.53, WEBDISP 7.54, WEBDISP 7.77, WEBDISP 7.85, WEBDISP 7.89, WEBDISP 7.90, WEBDISP 7.94, WEBDISP 7.95,<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. January 2024 notes Summary and highlights of the month The total number of notes\/patches this month was 12, which is 5 less than last month. The number of Hot News was 3, 1&#8230;<\/p>\n","protected":false},"author":6,"featured_media":9968,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[],"class_list":["post-9966","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, January 2024 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from January 2024, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, January 2024\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from January 2024, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-17T09:13:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-17T09:16:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/01\/Notas-SAP-enero-2024.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, January 2024\",\"datePublished\":\"2024-01-17T09:13:28+00:00\",\"dateModified\":\"2024-01-17T09:16:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/\"},\"wordCount\":903,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Notas-SAP-enero-2024.jpg\",\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/\",\"name\":\"SAP Security Notes, January 2024 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Notas-SAP-enero-2024.jpg\",\"datePublished\":\"2024-01-17T09:13:28+00:00\",\"dateModified\":\"2024-01-17T09:16:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from January 2024, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Notas-SAP-enero-2024.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Notas-SAP-enero-2024.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-january-2024\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, January 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, January 2024 - Inprosec","description":"All updates to SAP systems notes from January 2024, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, January 2024","og_description":"All updates to SAP systems notes from January 2024, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/","og_site_name":"Inprosec","article_published_time":"2024-01-17T09:13:28+00:00","article_modified_time":"2024-01-17T09:16:14+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/01\/Notas-SAP-enero-2024.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, January 2024","datePublished":"2024-01-17T09:13:28+00:00","dateModified":"2024-01-17T09:16:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/"},"wordCount":903,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/01\/Notas-SAP-enero-2024.jpg","articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/","name":"SAP Security Notes, January 2024 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/01\/Notas-SAP-enero-2024.jpg","datePublished":"2024-01-17T09:13:28+00:00","dateModified":"2024-01-17T09:16:14+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from January 2024, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/01\/Notas-SAP-enero-2024.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/01\/Notas-SAP-enero-2024.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-january-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, January 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=9966"}],"version-history":[{"count":2,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9966\/revisions"}],"predecessor-version":[{"id":9971,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9966\/revisions\/9971"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/9968"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=9966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=9966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=9966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}