{"id":1865,"date":"2022-04-25T11:23:30","date_gmt":"2022-04-25T09:23:30","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1865"},"modified":"2022-04-25T11:23:30","modified_gmt":"2022-04-25T09:23:30","slug":"sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/","title":{"rendered":"SAP patch day: How an identified vulnerability paves the way for a patch"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1867 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Security-Alert-300x179.jpg\" alt=\"SAST Blog Security-Alert\" width=\"300\" height=\"179\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Security-Alert-300x179.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Security-Alert.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Every month, SAP publishes a collection of new and updated SAP Notes involving vulnerabilities in the SAP software on patch day. It\u2019s a key date in the calendar for everyone concerned about security and the subsequent system patching is often very work-intensive and time-consuming. But where do the reports come from and how does SAP find out about them? Does the software vendor intentionally search for vulnerabilities to correct?<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>This month, we actively took part in the identification of a vulnerability on SAP patch day. It gave us the opportunity to analyze the structure of patch day in more detail and describe the reporting process.<\/p>\n<p>With 31 reports, the current April patch day contains updates to patches for 10 known vulnerabilities, while an additional 21 vulnerabilities are new. But who reports vulnerabilities? Is it an internal SAP process or external? Surprisingly, of the 31 total vulnerabilities this time around, five were reported by SAP and 26 from outside \u2013 meaning over 80 percent of the reports were submitted externally. This can be seen in each SAP Note, in the \u201cReported Externally\u201d field: If this field is set to \u201cYes\u201d, the report came from individuals or organizations outside of SAP.<\/p>\n<p>One explanation for the large external share is the fact that vulnerabilities can arise due to SAP\u2019s dependency on integrated external software solutions, such as the often-used component Log4j.<\/p>\n<h2><strong>The process from identifying a vulnerability to reporting to SAP<\/strong><\/h2>\n<p>As part of our analysis, we identified a .jsp (Java server page) in a current SAP system. In an older version, this file contained additional lines of code for an authentication check. This caused some confusion, because why should SAP have removed the authentication in a newer file? Potential answers include a restructuring of the source code or a relict \u2013 an older file from a previous release that may still have been present in the system.<\/p>\n<p>After some additional research, we discovered that a vulnerability had already been identified in the same context in the past. It was supposed to be corrected as of a specific patch level, but the system was already far above this level. We therefore advised SAP to review this case immediately.<\/p>\n<h2><strong>Two ways for reporting a vulnerability<\/strong><\/h2>\n<p>One option is to submit an incident for the affected component. Another method involves a pupblicly accessible form, which is intended for security researchers. Since this case involved a customer system, we decided to use the second method.<\/p>\n<p>In the <a href=\"https:\/\/www.sap.com\/about\/trust-center\/security\/incident-management.html\" target=\"_blank\" rel=\"noopener\">form for security researcher<\/a>, you select the product and the affected version and platform, then enter a title \u2013 this information serves as meta information for the report.<\/p>\n<h2><strong>Extensive reporting for reproducibility<\/strong><\/h2>\n<p>Reports of vulnerabilities should always be accompanied by a good description. For this reason, we described the vulnerability itself, as well as the procedure for reproducing it, in the report. The idea is to make it as easy as possible for the vendor to reproduce the situation. Thanks to its similarity with a previous vulnerability, we were even able to specify a specific component \u2013 which is helpful for SAP in forwarding the report to the responsible product team.<\/p>\n<h2><strong>Rapid response after report receipt <\/strong><\/h2>\n<p>Just one day after sending the report, we received an acknowledgment from the Product Security Response Team, together with the unique number assigned to our report. Just four days later, our finding was confirmed, together with the information that the vulnerability would be fixed on the April patch day. SAP requested an official CVE number and patched the identified vulnerability immediately.<\/p>\n<p>We were pleased with the fast response by SAP and by the fact that we were able to help improve SAP security this month.<\/p>\n<p>Don\u2019t delay patching your SAP systems \u2013 always implement the corrections described in the SAP security notes as quickly as possible. If you have any questions or need support with safeguarding your systems, visit <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener\">our website<\/a> or <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener\">e-mail us<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1866\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Alexander-Bertram-300x300.jpg\" alt=\"Alexander Bertram (SAP Security Consultant, SAST SOLUTIONS)\" width=\"300\" height=\"300\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Alexander-Bertram-300x300.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Alexander-Bertram-150x150.jpg 150w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Alexander-Bertram.jpg 481w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Alexander Bertram (SAP Security Consultant, SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>More info on the topic:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"SJM6IY61Zh\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/\">SAP February patch day: Highly critical vulnerability in core component threatens central SAP products (key word: ICMAD) \u2013 act immediately!<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;SAP February patch day: Highly critical vulnerability in core component threatens central SAP products (key word: ICMAD) \u2013 act immediately!&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2022\/02\/11\/sap-february-patch-day-highly-critical-vulnerability-in-core-component-threatens-central-sap-products\/embed\/#?secret=YHi3RqUPF9#?secret=SJM6IY61Zh\" data-secret=\"SJM6IY61Zh\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"ZFwwo9Ma1n\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/cross-site-scripting-xss-vulnerability-sap-netweaver-knowledge-management\/\">Act immediately to remedy the Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Knowledge Management!<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Act immediately to remedy the Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Knowledge Management!&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/cross-site-scripting-xss-vulnerability-sap-netweaver-knowledge-management\/embed\/#?secret=QCNqQu2dXY#?secret=ZFwwo9Ma1n\" data-secret=\"ZFwwo9Ma1n\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every month, SAP publishes a collection of new and updated SAP Notes involving vulnerabilities in the SAP software on patch day. It\u2019s a key date in the calendar for everyone concerned about security and the subsequent system patching is often very work-intensive and time-consuming. But where do the reports come from and how does SAP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[25,156,80,117],"class_list":["post-1865","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-cyber-attack","tag-cyber-security","tag-sap-security","tag-vulnerability-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How an identified vulnerability makes the way for a patch?<\/title>\n<meta name=\"description\" content=\"SAP patch day: Who reports a vulnerability and how does SAP find out about it? Read how you can actively participate in patch day.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How an identified vulnerability makes the way for a patch?\" \/>\n<meta property=\"og:description\" content=\"SAP patch day: Who reports a vulnerability and how does SAP find out about it? Read how you can actively participate in patch day.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-25T09:23:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Security-Alert.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"381\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How an identified vulnerability makes the way for a patch?\" \/>\n<meta name=\"twitter:description\" content=\"SAP patch day: Who reports a vulnerability and how does SAP find out about it? Read how you can actively participate in patch day.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Security-Alert.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"SAP patch day: How an identified vulnerability paves the way for a patch\",\"datePublished\":\"2022-04-25T09:23:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/\"},\"wordCount\":682,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Security-Alert-300x179.jpg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"SAP Security\",\"Vulnerability Assessment\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/\",\"name\":\"How an identified vulnerability makes the way for a patch?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Security-Alert-300x179.jpg\",\"datePublished\":\"2022-04-25T09:23:30+00:00\",\"description\":\"SAP patch day: Who reports a vulnerability and how does SAP find out about it? Read how you can actively participate in patch day.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Security-Alert.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Security-Alert.jpg\",\"width\":640,\"height\":381,\"caption\":\"SAST Blog Security-Alert\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/04\\\/25\\\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP patch day: How an identified vulnerability paves the way for a patch\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How an identified vulnerability makes the way for a patch?","description":"SAP patch day: Who reports a vulnerability and how does SAP find out about it? Read how you can actively participate in patch day.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/","og_locale":"en_US","og_type":"article","og_title":"How an identified vulnerability makes the way for a patch?","og_description":"SAP patch day: Who reports a vulnerability and how does SAP find out about it? Read how you can actively participate in patch day.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/","og_site_name":"SAST BLOG","article_published_time":"2022-04-25T09:23:30+00:00","og_image":[{"width":640,"height":381,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Security-Alert.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"How an identified vulnerability makes the way for a patch?","twitter_description":"SAP patch day: Who reports a vulnerability and how does SAP find out about it? Read how you can actively participate in patch day.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Security-Alert.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"SAP patch day: How an identified vulnerability paves the way for a patch","datePublished":"2022-04-25T09:23:30+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/"},"wordCount":682,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Security-Alert-300x179.jpg","keywords":["Cyber Attack","Cyber Security","SAP Security","Vulnerability Assessment"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/","url":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/","name":"How an identified vulnerability makes the way for a patch?","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Security-Alert-300x179.jpg","datePublished":"2022-04-25T09:23:30+00:00","description":"SAP patch day: Who reports a vulnerability and how does SAP find out about it? Read how you can actively participate in patch day.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Security-Alert.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/04\/Security-Alert.jpg","width":640,"height":381,"caption":"SAST Blog Security-Alert"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/04\/25\/sap-patch-day-how-an-identified-vulnerability-paves-the-way-for-a-patch\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"SAP patch day: How an identified vulnerability paves the way for a patch"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1865"}],"version-history":[{"count":3,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1865\/revisions"}],"predecessor-version":[{"id":1870,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1865\/revisions\/1870"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}