Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 2965287
was released on
13.10.2020 and deals with
"[CVE-2020-6363] Insufficient Session Expiration in SAP Commerce Cloud" within SAP Commerce Cloud.
We advice you to follow the instructions, to resolve
insufficient security function
with a
low potential for exploitation
in component CEC-COM-CPS.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as part of maintenance.
Risk specification
SAP Commerce Cloud does not invalidate active sessions after the user has changed their own passphrase.Solution
SAP Commerce Cloud has been updated to activate session invalidation after passphrase change.
- 9.0 [CVE-2023-0014] Capture-replay vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
- 8.5 [CVE-2022-41268] Privilege escalation vulnerability in SAP Business Planning and Consolidation
- 6.7 [CVE-2022-35295] Privilege Escalation Vulnerability in SAPOSCOL on Unix
- 6.5 Information Disclosure vulnerability in SAP Business Client
- 6.3 [CVE-2021-21472] Server password not set during installation of SAP NetWeaver Master Data Management 7.1