In response to identified vulnerabilities, SAP, a major player in enterprise software, has proactively addressed a critical improper access control flaw within its Business One product. This significant security concern, tracked as CVE-2023-31403 with a high CVSS score of 9.6, specifically impacted SAP Business One installation version 10.0. The vulnerability stemmed from a failure to conduct proper authentication and authorization checks for SMB shared folders.
Furthermore, the consequence of this lapse was the potential for malicious users to read, write, and execute files within the shared folder, posing substantial risks to confidentiality, integrity, and availability.
The November 2023 Security Patch Day from SAP introduced a series of updates, with the most severe being the aforementioned improper access control vulnerability. Another notable update addressed an issue tracked as CVE-2023-40309 with a CVSS score of 9.8, related to a missing authorization check in SAP CommonCryptoLib.
Additionally, the advisory highlighted that SAP CommonCryptoLib failed to perform necessary authentication checks, potentially leading to incorrect authorization checks for authenticated users. This flaw had the potential to result in the escalation of privileges, enabling attackers to exploit functionality restricted to specific user groups and manipulate or delete restricted data.
Additionally, the security update included fixes for four medium-severity vulnerabilities, emphasizing SAP’s commitment to maintaining a secure software environment. The comprehensive list of addressed issues can be found in SAP Security Note #3355658, underlining the company’s dedication to promptly addressing and rectifying potential security risks within its products.
Reference: