Advisory
On 12.04.2022 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP HANA Platform.
SAP Note 3189428 addresses "[CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP HANA Extended Application Services" to prevent remote code execution with a hot news risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
SAP HANA Extended Application Services uses a version of Spring Framework which has Remote Code Execution vulnerabilitySolution
To solve the code execution vulnerability the SAP HANA XS advanced model needs to be updated to version 1.0.145 or greater
- 10.0 [CVE-2023-27497] Multiple vulnerabilities in SAP Diagnostics Agent (OSCommand Bridge and EventLogServiceCollector)
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Checkout
- 9.8 [CVE-2022-22965] Central Security Note for Remote Code Execution vulnerability associated with Spring Framework
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in PowerDesigner Web (up to including 16.7 SP05 PL01)
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in in SAP Business One Cloud