Organizations urged to immediately patch SAP server vulnerability

The Department of Homeland Security鈥檚 Cybersecurity and Infrastructure Security Agency yesterday organizations to a critical vulnerability affecting the SAP NetWeaver Application Server, which an attacker could exploit through the Hypertext Transfer Protocol (HTTP) to take control of trusted SAP applications. 鈥淒ue to the criticality of this vulnerability, the attack surface this vulnerability represents, and the importance of SAP鈥檚 business applications, [CISA] strongly recommends organizations immediately apply patches,鈥 the agency said. 鈥淐ISA recommends organizations prioritize patching internet-facing systems, and then internal systems.鈥
Earlier this month, federal agencies also the field to a significant vulnerability affecting the Palo Alto Networks鈥 PAN-OS firewall software, which attackers could easily exploit remotely via the internet, and to a .
鈥淭his is one of the most significant series of severe vulnerabilities released in recent memory,鈥 said John Riggi, AHA senior advisor for cybersecurity and risk. 鈥淎s warned by U.S. Cyber Command, FBI, CISA and HHS, sophisticated cyber adversaries, including international criminal organizations and hostile nation-states are expected to exploit these vulnerabilities. Applying these patches quickly, especially to any mission critical systems impacting patient care, is urgent.鈥
Hospitals and health systems may direct questions on cybersecurity and risk to Riggi at jriggi@aha.org.