Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3189635
was released on
14.04.2022 and deals with
"[CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Profitability Analytics" within SAP Customer Profitability Analytics.
We advice you to follow the instructions, to resolve
remote code execution
with a
hot news potential for exploitation
in component IS-T-MA.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as part of maintenance.
Risk specification
SAP Customer Profitability Analytics uses a version of Spring Framework which has Remote Code Execution vulnerabilitySolution
The Spring framework has been updated to a patched version, which isn't vulnerable to Spring4Shell attacks.
The advisory is valid for
- MTA_BDT_CORE 2
- 10.0 [CVE-2023-27497] Multiple vulnerabilities in SAP Diagnostics Agent (OSCommand Bridge and EventLogServiceCollector)
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Checkout
- 9.8 [CVE-2022-22965] Central Security Note for Remote Code Execution vulnerability associated with Spring Framework
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in PowerDesigner Web (up to including 16.7 SP05 PL01)
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in in SAP Business One Cloud