Stay on top of the latest media coverage, and company and product announcements from the leader in business-critical application security and compliance solutions.
A critical vulnerability in applications made by software giant SAP could affect up to 40,000 SAP customers, offering a pathway for hackers to remotely steal or alter data, researchers warned Tuesday.
Aufgrund eines Fehlers in SAP NetWeaver Application Server könnten Angreifer die volle Kontrolle über SAP-Systeme erlangen.
En sårbarhet av den mest allvarliga graden åtgärdas nu av SAP genom en uppdatering. Sårbarheten gäller många av SAP produkter och uppåt 40 000 kunder.
SAP NetWeaver Application Server Java vulnerability can be exploited without authentication and lead to complete system takeover. Patch now.
Users of multiple SAP products including S4/HANA should apply the security update as soon as possible to protect their systems
SAP has patched a critical vulnerability impacting the LM Configuration Wizard component in NetWeaver Application Server (AS) Java platform, allowing an unauthenticated attacker to take control of SAP applications.
SAP has issued patches to fix a critical vulnerability (CVE-2020-6287) that can lead to total compromise of vulnerable SAP installations by a remote, unauthenticated attacker.
Exploitation of the bug can allow an attacker to lift sensitive information, delete files, execute code, carry out sabotage and more.
SAP patched a critical vulnerability affecting over 40,000 customers and found in the SAP NetWeaver AS JAVA (LM Configuration Wizard) versions 7.30 to 7.50, a core component of several solutions and products deployed in most SAP environments.