Advisory
On 12.04.2022 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within Any.
SAP Note 3170990 addresses "[CVE-2022-22965] Central Security Note for Remote Code Execution vulnerability associated with Spring Framework" to prevent remote code execution with a hot news risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as informational note only, the team suggests.
Risk specification
This note has been re-released with updated 'Solution’ information. This security note is the central document to consolidate all SAP Security Notes released for the Remote Code Execution vulnerability associated with Spring FrameworkSolution
This note contains the list of notes related to the Remote Code Execution vulnerability associated with the Spring Framework. More Information can be found in the notes that are listed in the note solution.
- 10.0 [CVE-2023-27497] Multiple vulnerabilities in SAP Diagnostics Agent (OSCommand Bridge and EventLogServiceCollector)
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Profitability Analytics
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Checkout
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in PowerDesigner Web (up to including 16.7 SP05 PL01)
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in in SAP Business One Cloud