Thursday, February 20, 2025
HomeCVE/vulnerabilitySAP to Address Security Issues With Some Cloud Products and to Notify...

SAP to Address Security Issues With Some Cloud Products and to Notify 440,000 Customers

Published on

SIEM as a Service

Follow Us on Google News

SAP(Systems Applications and Products) announced on Monday that they are to patch security issues with some of their cloud-based products.

The bugs are identified as a part of the internal cybersecurity audit and the company already started working on it.

SAP Security Issues

SAP said that some of it is “cloud products do not meet one or several contractually agreed or statutory IT security standards” and they started to fix them.

Following are the products affected;

SAP Success Factors, SAP Concur, SAP/CallidusCloud Commissions, SAP/Callidus Cloud CPQ; as well as SAP C4C/Sales Cloud, SAP Cloud Platform, and SAP Analytics Cloud.

SAAP confirms that the vulnerabilities are not identified as a part of a security incident and no customer data has been compromised.

“To ensure that the affected products meet relevant terms and conditions and in addition to technical remediation, SAP has decided to update its security-related terms and conditions. These remain in line with market peers,” reads the advisory.

SAP said they started fixing the bugs with affected products to meet the IT security standards at present and the bug fixes will largely be completed in the second quarter of 2020.

SAP SE executive board has decided to “inform and support the affected customers individually – approximately 9 percent of SAP’s 440,000 customers.”

SAP has more than 75,000 customers in 120 countries and has 140,000 installations worldwide.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

PoC Exploit Released for Ivanti EPM Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Fedora Linux Kernel Flaw Exposed Sensitive Data to Attackers

A newly discovered vulnerability in the Fedora Linux kernel, identified as CVE-2025-1272, has raised...

IBM OpenPages Flaw Exposed Authentication Credentials to Attackers

IBM recently disclosed multiple vulnerabilities in its OpenPages platform, a tool widely used for...

Symantec Diagnostic Tool Flaw Enables Unauthorized Privilege Escalation

Symantec, a division of Broadcom, has released a critical security update to address a...