- Un paso adelante en la digitalización del Camino de Santiago francés sin renunciar a su legado, tradición y espiritualidad
- Addressing the wider cyber skills gap through the agriculture industry
- Level the playing field with GenAI: Top SMB use cases
- Tenable Selected by Bank of Yokohama to Secure its Active Directory and Eliminate Attack Paths
- I switched to the iPhone 16 from an iPhone 15, and the upgrade was bigger than expected
SAP patches critical bugs allowing full system compromise
Two critical vulnerabilities
Of the two critical vulnerabilities addressed in the patch day, the more severe is an authentication bypass flaw (CVE-2024-41730) with a CVSS score of 9.8/10 affecting SAP’s BusinessObjects business intelligence platform, while the other is a server-side request forgery (SSRF) vulnerability in applications built with SAP Build Apps.
CVE-2024-41730, as described by SAP, stems from a missing authentication check in the SAP BusinessObjects business intelligence platform. “In SAP BusinessObjects Business Intelligence Platform, if Single Signed On is enabled on Enterprise authentication, an unauthorized user can get a logon token using a REST endpoint,” the ERP vendor said in a security advisory.
The attacker can fully compromise the system resulting in a high impact on confidentiality, integrity, and availability, SAP added.