Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3320145
was released on
09.05.2023 and deals with
"Denial of service (DOS) in SAP Commerce" within SAP Commerce.
We advice you to follow the instructions, to resolve
denial of service (dos)
with a
high potential for exploitation
in component CEC-COM-CPS-OTH.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as part of maintenance.
Denial of Service (DoS) attacks that take a system offline may lead to significant cost for the company, studies quantify the costs in average between 4 and 5 millions dollars. Business continuity requires SAP systems staying online. The CVSS scores or vulnerability descriptions are not enough to represent how a simple bug can lead to a significant loss for companies.
Risk specification
SAP Commerce allows an unauthenticated attacker to induce a stack overflow error due to a vulnerability in older XStream library resulting in a denial of service vulnerability.Solution
The issue is fixed by upgrading to a current patch release.
- 9.8 Multiple vulnerabilities associated with Reprise License Manager 14.2 component used with SAP 3D Visual Enterprise License Manager
- 7.8 [CVE-2023-33990] Denial of service (DOS) vulnerability in SAP SQL Anywhere
- 7.7 [CVE-2023-35871] Memory Corruption vulnerability in SAP Web Dispatcher
- 7.5 [CVE-2023-32111] Memory Corruption vulnerability in SAP PowerDesigner (Proxy)
- 7.5 [CVE-2020-6186] Denial of Service (DOS) Vulnerability in SAP Host Agent