This comprehensive update focuses on addressing multiple vulnerabilities in SAP’s extensive product portfolio, with a particular spotlight on critical code injection flaws that posed significant risks to enterprise environments. By addressing critical vulnerabilities like code injection and authentication bypass issues, SAP ensures the resilience of its products while urging customers to act swiftly in applying these patches for maximum protection. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. To mitigate code injection vulnerabilities, developers are advised to implement rigorous input validation and sanitization processes. Timely patching is crucial to prevent exploitation of these vulnerabilities, which could lead to data breaches or unauthorized system control. Kaaviya is a Security Editor and fellow reporter with Cyber Security News. With a CVSS score of 9.8, this flaw could allow attackers to bypass authentication mechanisms and gain unauthorized access to sensitive systems. This flaw could enable unauthorized code execution, leading to severe operational disruptions. Both vulnerabilities have been classified as ‘Critical’ due to the ease of exploitation and the significant damage they could inflict. A Time-of-check Time-of-use race condition vulnerability in Apache Tomcat within SAP Commerce Cloud [CVE-2024-56337], CVSS 8.1, has been patched.
This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 08 Apr 2025 14:20:25 +0000