Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3111110
was released on
08.03.2022 and deals with
"[CVE-2022-26100] Denial of service (DOS) in SAPCAR" within SAPCAR.
We advice you to follow the instructions, to resolve
denial of service (dos)
with a
medium potential for exploitation
in component BC-INS-TLS.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as project.
Denial of Service (DoS) attacks that take a system offline may lead to significant cost for the company, studies quantify the costs in average between 4 and 5 millions dollars. Business continuity requires SAP systems staying online. The CVSS scores or vulnerability descriptions are not enough to represent how a simple bug can lead to a significant loss for companies.
Risk specification
SAPCAR does not contain sufficient input validation on the SAPCAR archive, resulting in a denial of serviceSolution
SAPCAR has been updated so that the invalid memory access and possible crash are now prevented by proper input validation. Once the invalid input is detected, SAPCAR exits immediately with an error message.
The advisory is valid for
- SAP_CAR 7.22
- 9.8 Multiple vulnerabilities associated with Reprise License Manager 14.2 component used with SAP 3D Visual Enterprise License Manager
- 7.8 [CVE-2023-33990] Denial of service (DOS) vulnerability in SAP SQL Anywhere
- 7.7 [CVE-2023-35871] Memory Corruption vulnerability in SAP Web Dispatcher
- 7.5 Denial of service (DOS) in SAP Commerce
- 7.5 [CVE-2020-6186] Denial of Service (DOS) Vulnerability in SAP Host Agent