Advisory
On 10.03.2020 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP Enable Now.
SAP Note 2845363 addresses "[CVE-2020-6197] Insufficient session expiration in SAP Enable Now Manager" to prevent insufficient security function with a low risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
SAP Enable Now does not invalidate session tokens in a timely manner.Solution
The Session duration can now be configured in the Administration Settings from the Manager.
Affected System
SAP Enable Now provides the knowledge your employees need to succeed exactly where and when it’s needed. The product exists for on-premise and cloud applications. A security guide is provided for each facet of the SAP Enable Now product.
The advisory is valid for
- 9.0 [CVE-2023-0014] Capture-replay vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
- 8.5 [CVE-2022-41268] Privilege escalation vulnerability in SAP Business Planning and Consolidation
- 6.7 [CVE-2022-35295] Privilege Escalation Vulnerability in SAPOSCOL on Unix
- 6.5 Information Disclosure vulnerability in SAP Business Client
- 6.3 [CVE-2021-21472] Server password not set during installation of SAP NetWeaver Master Data Management 7.1