{"id":1819,"date":"2022-02-11T15:02:50","date_gmt":"2022-02-11T14:02:50","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1819"},"modified":"2022-02-11T15:02:50","modified_gmt":"2022-02-11T14:02:50","slug":"sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/","title":{"rendered":"SAP February patch day: Highly critical vulnerability in core component threatens central SAP products (key word: ICMAD) \u2013 act immediately!"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1487 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/security-5043368_640-002-300x179.jpg\" alt=\"SAST Blog: Act immediately to remedy the Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Knowledge Management!\" width=\"300\" height=\"179\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/security-5043368_640-002-300x179.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/security-5043368_640-002.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>A major security vulnerability, which has been assigned a top severity rating, threatens SAP ERP 6.0, S\/4HANA, NetWeaver, and Web Dispatcher, among others. The U.S. Cybersecurity &amp; Infrastructure Security Agency (CISA) has issued an alert warning of potential attacks on SAP products. Patch your SAP systems IMMEDIATELY!<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Attackers who exploit vulnerabilities in the ERP software can compromise computers fully. Attacks are possible from both intranet and internet, without requiring verification. All SAP users should act immediately and patch their systems!<\/p>\n<h2><strong>Act immediately to avoid disastrous consequences<\/strong><\/h2>\n<p>In its alert, the CISA states that attackers could infect systems with ransomware, among other risks. The agency also warns against potential financial fraud and disruption of mission-critical business processes. It is unknown whether attacks have already occurred.<\/p>\n<p>The critical vulnerability (CVE-2022-22536 CVSS, score 10\/10) involves the SAP Internet Communication Manager (ICM). This core component is used by Content Server, NetWeaver ABAP and JAVA, and Web Dispatcher, among other products.<\/p>\n<p>Attackers can bypass authentication, manipulating user requests and executing functions in the name of the victim. It can fully compromise systems.<\/p>\n<p>Sources:<\/p>\n<p><a href=\"https:\/\/www.heise.de\/news\/Jetzt-patchen-Kritische-Luecke-in-Kernkomponente-bedroht-SAP-Produkte-6369582.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.heise.de\/news\/Jetzt-patchen-Kritische-Luecke-in-Kernkomponente-bedroht-SAP-Produkte-6369582.html<\/a><\/p>\n<p><a href=\"https:\/\/securityboulevard.com\/2022\/02\/sap-security-patch-day-february-2022-severe-http-smuggling-vulnerabilities-in-sap-netweaver\/\" target=\"_blank\" rel=\"noopener\">https:\/\/securityboulevard.com\/2022\/02\/sap-security-patch-day-february-2022-severe-http-smuggling-vulnerabilities-in-sap-netweaver\/<\/a> and security SAP notes.<\/p>\n<p>The Security Notes 3123396 and 3123427, declared as Security Notes from the patch day on February 8, 2022, provide detailed information as to how to proceed:<\/p>\n<p><strong>3123396 \u2013 Request smuggling and request concatenation in SAP NetWeaver, SAP Content Server and SAP Web Dispatcher [CVE-2022-22536]<\/strong><\/p>\n<p>Please assess the workaround applicability for your SAP landscape prior to implementation. SAP note 3137885 describes a workaround.<\/p>\n<p>Note that this workaround is a temporary fix and is not a permanent solution. SAP strongly recommends using it only if a patch of the affected application systems is not possible on short notice. SAP strongly recommends that you apply the corrections outlined in the security note, which can be done in lieu of the workaround or after the workaround is implemented.<\/p>\n<p><strong>Install the patch in the systems as soon as possible and remove the workaround once patching is complete!<\/strong><\/p>\n<p>This correction is delivered with the following archives:<\/p>\n<ul>\n<li>SAPWEBDISP.SAR<\/li>\n<li>Hotfix &#8211; file dw.sar<\/li>\n<li>SP Stack Kernel &#8211; files SAPEXE.SAR and SAPEXEDB.SAR<\/li>\n<\/ul>\n<p>The correction requires patching both SAP Web Dispatcher and SAP Kernel. The patch solves the security issue completely. SAP cannot provide a way to test the success of the patch.<\/p>\n<p>The workaround for ICM patching is described in SAP Note 3137885 &#8211; Workaround for security SAP note 3123396.<\/p>\n<p><strong><em>\u201cIn my opinion, the complexity of the workaround described here renders it unusable in practice. I therefore recommend applying the kernel patches immediately.\u201d<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>3123427 \u2013 HTTP Request Smuggling in SAP NetWeaver Application Server Java [CVE-2022-22532]<\/strong><\/p>\n<p>These vulnerabilities have been fixed by proper memory handling for HTTP pipeline requests. The correction is contained in all patch levels that are equal to or higher than the patch level listed in the &#8220;Support Package Patches&#8221; section of this SAP Note for the desired kernel release. This correction is delivered with the following kernel archives:<\/p>\n<ul>\n<li>hotfix &#8211; DW.SAR<\/li>\n<li>SP Stack Kernel &#8211; files SAPEXE.SAR and SAPEXEDB.SAR<\/li>\n<\/ul>\n<p>Please assess the workaround applicability for your SAP landscape prior to implementation. Note that this workaround is a temporary fix and is not a permanent solution. SAP strongly recommends you apply the corrections outlined in the security note, which can be done in lieu of the workaround or after the workaround is implemented.<\/p>\n<p>If the support of HTTP pipeline requests is not required on the server, the workaround can be implemented to avoid the issue by disabling the support of HTTP pipeline requests via the profile parameter setting icm\/handle_http_pipeline_requests=FALSE.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1805\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi-300x225.jpg\" alt=\"Ralf Kempf (SAST SOLUTIONS)\" width=\"300\" height=\"225\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi-300x225.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi-1024x768.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi-768x576.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi-800x600.jpg 800w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi.jpg 1155w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Ralf Kempf (CTO SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A major security vulnerability, which has been assigned a top severity rating, threatens SAP ERP 6.0, S\/4HANA, NetWeaver, and Web Dispatcher, among others. The U.S. Cybersecurity &amp; Infrastructure Security Agency (CISA) has issued an alert warning of potential attacks on SAP products. Patch your SAP systems IMMEDIATELY!<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[25,156,153,80,114],"class_list":["post-1819","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-cyber-attack","tag-cyber-security","tag-s-4hana","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SAP February patch day: Highly critical vulnerability in core component<\/title>\n<meta name=\"description\" content=\"The critical vulnerability CVSS score 10\/10 threatens SAP ERP 6.0, S\/4HANA, NetWeaver, and Web Dispatcher, among others. Patch quickly!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP February patch day: Highly critical vulnerability in core component\" \/>\n<meta property=\"og:description\" content=\"The critical vulnerability CVSS score 10\/10 threatens SAP ERP 6.0, S\/4HANA, NetWeaver, and Web Dispatcher, among others. Patch quickly!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-11T14:02:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/security-5043368_640-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"381\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"SAP February patch day: Highly critical vulnerability in core component\" \/>\n<meta name=\"twitter:description\" content=\"The critical vulnerability CVSS score 10\/10 threatens SAP ERP 6.0, S\/4HANA, NetWeaver, and Web Dispatcher, among others. Patch quickly!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/security-5043368_640-002.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"SAP February patch day: Highly critical vulnerability in core component threatens central SAP products (key word: ICMAD) \u2013 act immediately!\",\"datePublished\":\"2022-02-11T14:02:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/\"},\"wordCount\":627,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/security-5043368_640-002-300x179.jpg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"S\\\/4HANA\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/\",\"name\":\"SAP February patch day: Highly critical vulnerability in core component\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/security-5043368_640-002-300x179.jpg\",\"datePublished\":\"2022-02-11T14:02:50+00:00\",\"description\":\"The critical vulnerability CVSS score 10\\\/10 threatens SAP ERP 6.0, S\\\/4HANA, NetWeaver, and Web Dispatcher, among others. Patch quickly!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/security-5043368_640-002.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/security-5043368_640-002.jpg\",\"width\":640,\"height\":381,\"caption\":\"SAST Blog: Act immediately to remedy the Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Knowledge Management!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/02\\\/11\\\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP February patch day: Highly critical vulnerability in core component threatens central SAP products (key word: ICMAD) \u2013 act immediately!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SAP February patch day: Highly critical vulnerability in core component","description":"The critical vulnerability CVSS score 10\/10 threatens SAP ERP 6.0, S\/4HANA, NetWeaver, and Web Dispatcher, among others. Patch quickly!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/","og_locale":"en_US","og_type":"article","og_title":"SAP February patch day: Highly critical vulnerability in core component","og_description":"The critical vulnerability CVSS score 10\/10 threatens SAP ERP 6.0, S\/4HANA, NetWeaver, and Web Dispatcher, among others. Patch quickly!","og_url":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/","og_site_name":"SAST BLOG","article_published_time":"2022-02-11T14:02:50+00:00","og_image":[{"width":640,"height":381,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/security-5043368_640-002.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"SAP February patch day: Highly critical vulnerability in core component","twitter_description":"The critical vulnerability CVSS score 10\/10 threatens SAP ERP 6.0, S\/4HANA, NetWeaver, and Web Dispatcher, among others. Patch quickly!","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/security-5043368_640-002.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"SAP February patch day: Highly critical vulnerability in core component threatens central SAP products (key word: ICMAD) \u2013 act immediately!","datePublished":"2022-02-11T14:02:50+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/"},"wordCount":627,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/security-5043368_640-002-300x179.jpg","keywords":["Cyber Attack","Cyber Security","S\/4HANA","SAP Security","Threat Detection"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/","url":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/","name":"SAP February patch day: Highly critical vulnerability in core component","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/security-5043368_640-002-300x179.jpg","datePublished":"2022-02-11T14:02:50+00:00","description":"The critical vulnerability CVSS score 10\/10 threatens SAP ERP 6.0, S\/4HANA, NetWeaver, and Web Dispatcher, among others. Patch quickly!","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/security-5043368_640-002.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/security-5043368_640-002.jpg","width":640,"height":381,"caption":"SAST Blog: Act immediately to remedy the Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Knowledge Management!"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"SAP February patch day: Highly critical vulnerability in core component threatens central SAP products (key word: ICMAD) \u2013 act immediately!"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1819"}],"version-history":[{"count":2,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1819\/revisions"}],"predecessor-version":[{"id":1821,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1819\/revisions\/1821"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}