Advisory
On 12.12.2023 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP GUI / Frontend.
SAP Note 3385711 addresses "[CVE-2023-49580] Information disclosure vulnerability in SAP GUI for WIndows and SAP GUI for Java" to prevent information disclosure with a high risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process, the team suggests.
Information disclosure is when an application fails to properly protect sensitive and confidential information from
parties that are not supposed to have access to the subject matter in normal circumstances.
Carefully review every information disclosure vulnerablity in regards to disclosure obligations post-GDPR for
‘Personal data’ under the Data Protection Act 2018.
Risk specification
This Security Note was re-released with updated title, symptom section and Reason and Prerequisites. SAP GUI for Windows and SAP GUI for Java allows unauthorized access to restrict and confidential information.Solution
The application no longer exposes confidential information that should be restricted
The advisory is valid for
- SAP_BASIS 755-758
- 9.9 [CVE-2023-40622] Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Promotion Management)
- 9.8 [CVE-2023-28765] Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Promotion Management )
- 9.1 [CVE-2023-28762] Information Disclosure in SAP BusinessObjects Business Intelligence Platform (Central Management Console)
- 9.0 [CVE-2020-6252] Information Disclosure in SAP Adaptive Server Enterprise (Cockpit)
- 8.9 Information Disclosure in Central Order