Security News > 2021 > March > SAP Stomps Out Critical RCE Flaw in Manufacturing Software
Enterprise software giant SAP pushed out fixes for a critical-severity vulnerability in its real-time data monitoring software for manufacturing operations.
If exploited, the flaw could allow an attacker to access SAP databases, infect end users with malware and modify network configurations.
The two most critical fixes, which are newly released as part of the security update, included the vulnerability in SAP's Manufacturing Integration and Intelligence application for synchronizing manufacturing operations, as well as one in SAP's NetWeaver AS Java software stack.
"With SAP MII, SAP NetWeaver AS Java and SAP HANA, three different applications are affected this time by critical vulnerabilities."
Beyond these two serious flaws, SAP also fixed an authentication bypass in SAP HANA. It also made updates to two previous security updates - including a missing authentication check in SAP Solution Manager and a security update for Google Chromium.
The fixes come after a February security update by SAP fixing a critical vulnerability in its Commerce platform for e-commerce businesses.
News URL
https://threatpost.com/sap-critical-rce-flaw-manufacturing/164666/
Related news
- Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices (source)
- HPE warns of critical RCE flaws in Aruba Networking access points (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- Palo Alto Networks warns of critical RCE zero-day exploited in attacks (source)
- Critical RCE bug in VMware vCenter Server now exploited in attacks (source)
- Critical 9.8-rated VMware vCenter RCE bug exploited after patch fumble (source)
- Veeam warns of critical RCE bug in Service Provider Console (source)
- Exploit released for critical WhatsUp Gold RCE flaw, patch now (source)
- Veeam Issues Patch for Critical RCE Vulnerability in Service Provider Console (source)
- PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785) (source)