Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3187290
was released on
12.04.2022 and deals with
"[CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Checkout" within SAP Customer Checkout.
We advice you to follow the instructions, to resolve
remote code execution
with a
hot news potential for exploitation
in component IS-SE-CCO.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as part of maintenance.
Risk specification
SAP Customer Checkout uses a version of Spring Framework which has Remote Code Execution vulnerabilitySolution
Update to one of the following versions mentioned in the note which uses a newer version of Spring Framework
- 10.0 [CVE-2023-27497] Multiple vulnerabilities in SAP Diagnostics Agent (OSCommand Bridge and EventLogServiceCollector)
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Profitability Analytics
- 9.8 [CVE-2022-22965] Central Security Note for Remote Code Execution vulnerability associated with Spring Framework
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in PowerDesigner Web (up to including 16.7 SP05 PL01)
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in in SAP Business One Cloud