Advisory
On 12.09.2023 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within PowerDesigner.
SAP Note 3357163 addresses "[CVE-2023-40621] Code Injection vulnerability in SAP PowerDesigner Client" to prevent code injection with a medium risk for exploitation.
A workaround does exist, according to SAP Security Advisory team. It is advisable to implement the correction as none, the team suggests.
Risk specification
SAP PowerDesigner Client allows an unauthenticated attacker to inject VBScript code in document and have it opened by unsuspecting user, to have it executed by the application on behalf of user. The application has security option to disable or prompt users before untrusted scripts are executed, but this is not set as default.Solution
Upgrade to SAP PowerDesigner Client version 16.7 SP07: Default security level raised to "Prompt To Run" Circumstances exist that prevent the timely installation of a patch provided by the manufacturer. In such cases, you may consider applying the suggested workaround as a temporary or compensating mitigation: "Please assess the workaround applicability for your SAP landscape prior to implementation. Note that this workaround is a temporary fix and is not a permanent solution. SAP strongly recommends you apply the corrections outlined in the security note, which can be done in lieu of the workaround or after the workaround is implemented. As a workaround, one of the following can be applied : let each user manually raise security level setting to "Prompt to Run" (or "Block") enforce default security level for all users on a machine by applying registry: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Sybase\PowerDesigner 16\General] "ScriptTrustabilityCheckLevel"="Prompt"".
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP Customer Checkout
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP BTP Cloud Foundry
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP HANA XSA
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in XSA Cockpit
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP Edge Services On Premise Edition