A supply chain vulnerability in the SAP transport system that allows attackers to infiltrate the change management or software deployment process has been identified by a cybersecurity provider based in Germany. A patch has been published by SAP SE to fix the issue that threatens all SAP environments that share a single transport directory.
SAP transport system vulnerable to malicious interference
SAP software products are used by companies across the globe, with many providing critical infrastructure, food, energy, and medical supplies. The internal SAP development supply chain is used by customers to request additional functionality and in-house developments to the SAP standard, with changes provided via various staging systems of the respective SAP landscape with SAP transport requests. These requests should not be modified after they have been exported from the central transport directory and released.
More Stories
Volt Typhoon Accessed US OT Network for Nearly a Year
Volt Typhoon's ten-month intrusion of Littleton Electric Light and Water Departments exposes vulnerabilities in the US electric grid Read More
CISA, FBI Warn of Medusa Ransomware Impacting Critical Infrastructure
CISA and FBI warn of Medusa ransomware impacting over 300 victims across critical infrastructure sectors with double extortion tactics Read...
Chromecast chaos – 2nd gen devices go belly-up as Google struggles to fix certificate issue
Has your old Chromecast suddenly developed a problem? You're not alone it seems. Read more in my article on the...
‘ClickFix’ Phishing Scam Impersonates Booking.com to Target Hospitality
Microsoft said the ongoing phishing campaign is designed to infect hospitality firms with multiple credential-stealing malware Read More
Medusa ransomware: FBI and CISA urge organisations to act now to mitigate threat
The Medusa ransomware gang continues to present a major threat to the critical infrastructure sector, according to a newly-released -...