Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章主要讲的是SAP发布了安全更新,修复了两个关键漏洞。这两个漏洞分别是CVE-2019-17571和CVE-2026-27685,CVSS评分都很高,分别是9.8和9.1。前者是代码注入漏洞,影响SAP的报价管理保险应用;后者是反序列化漏洞,影响NetWeaver企业门户管理。 此外,文章还提到微软、Adobe、HPE等公司最近也发布了补丁,修复了多个漏洞。特别是HPE修复了Aruba网络设备的一个严重漏洞,CVSS评分9.8,允许攻击者绕过认证控制,甚至重置管理员密码。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖SAP的两个漏洞、其他公司的补丁情况以及HPE的严重漏洞。 最后,组织语言时要简洁明了,避免使用复杂的句子结构。确保信息准确且全面。 </think> SAP发布安全更新修复两个关键漏洞:CVE-2019-17571(CVSS 9.8)为代码注入漏洞,影响SAP报价管理保险应用;CVE-2026-27685(CVSS 9.1)为反序列化漏洞,影响NetWeaver企业门户管理。其他厂商如微软、Adobe、HPE等近期也发布了补丁修复多处漏洞。HPE修复Aruba网络设备严重漏洞(CVE-2026-23813),允许攻击者绕过认证并重置管理员密码。 2026-3-11 12:26:0 Author: thehackernews.com(查看原文) 阅读量:10 收藏

Vulnerability / Enterprise Security

SAP has released security updates to address two critical security flaws that could be exploited to achieve arbitrary code execution on affected systems.

The vulnerabilities in question listed below -

  • CVE-2019-17571 (CVSS score: 9.8) - A code injection vulnerability in SAP Quotation Management Insurance application (FS-QUO)
  • CVE-2026-27685 (CVSS score: 9.1) - An insecure deserialization vulnerability in SAP NetWeaver Enterprise Portal Administration

"The application uses an outdated artifact of Apache Log4j 1.2.17 that is vulnerable to CVE-2019-17571," SAP security company Onapsis said. "It allows an unprivileged attacker to execute arbitrary code remotely on the server, causing high impact on confidentiality, integrity, and availability of the application."

CVE-2026-27685, on the other hand, stems from missing or insufficient validation during the deserialization of uploaded content, which could allow an attacker to upload untrusted or malicious content.

"Only the fact that an attacker requires high privileges for a successful exploit prevents the vulnerability from being tagged with a CVSS score of 10," Onapsis added.

The disclosure comes as Microsoft shipped patches for 84 vulnerabilities across products, including dozens of privilege escalation and remote code execution flaws.

On Tuesday, Adobe also announced patches for 80 vulnerabilities, four of which are critical flaws impacting Adobe Commerce and Magento Open Source that could result in privilege escalation and security feature bypass. Separately, it fixed five critical vulnerabilities in Adobe Illustrator that could pave the way for arbitrary code execution.

Elsewhere, Hewlett Packard Enterprise put out fixes for five shortcomings in Aruba Networking AOS-CX. The most severe of the flaws is CVE-2026-23813 (CVSS score: 9.8), an authentication bypass affecting the management interface.

"A vulnerability has been identified in the web-based management interface of AOS-CX switches that could potentially allow an unauthenticated remote actor to circumvent existing authentication controls," HPE said. "In some cases, this could enable resetting the admin password."

"Exploitation of this Aruba vulnerability potentially gives attackers full control of AOS-CX network devices and the ability to compromise an entire system undetected," Ross Filipek, CISO at Corsica Technologies, said in a statement.

"A successful compromise could lead to the disruption of network communications or the erosion of the integrity of key business services. This flaw is a reminder that vulnerabilities in network devices are becoming more common in today's hyper-connected world. When attackers gain privileged access to these devices, it puts organizations at significant risk."

Software Patches from Other Vendors

Security updates have also been released by other vendors over the past few weeks to rectify several vulnerabilities, including —

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/dozens-of-vendors-patch-security-flaws.html
如有侵权请联系:admin#unsafe.sh