{"id":1174,"date":"2022-02-09T16:28:44","date_gmt":"2022-02-09T16:28:44","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=1174"},"modified":"2023-09-06T16:38:29","modified_gmt":"2023-09-06T16:38:29","slug":"the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/de\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/","title":{"rendered":"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications"},"content":{"rendered":"<h3><strong>Onapsis: Threat Report<\/strong><\/h3>\n<h3>Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component<\/h3>\n<p><strong>Executive Summary<\/strong><\/p>\n<p>Detailed research from the Onapsis Research Labs over the past year in HTTP Response Smuggling led to the discovery of a set of critical vulnerabilities affecting SAP applications actively using the SAP Internet Communication Manager (ICM), which we are referring to as ICMAD (Internet Communication Manager Advanced Desync). This discovery requires immediate attention by most SAP customers, given the widespread usage of the vulnerable technology component in SAP landscapes around the world.<\/p>\n<p>[dlm_gf_form download_id=1170 ajax=&#8221;true&#8221;]<\/p>","protected":false},"excerpt":{"rendered":"<p>Onapsis: Threat Report Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component Executive Summary Detailed research&#8230;<\/p>","protected":false},"author":25,"featured_media":1173,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16,31],"tags":[],"class_list":["post-1174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-technology","category-onapsis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge<\/title>\n<meta name=\"description\" content=\"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/de\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/de\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-09T16:28:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-06T16:38:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"607\" \/>\n\t<meta property=\"og:image:height\" content=\"409\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steph Napier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steph Napier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/\",\"url\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/\",\"name\":\"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg\",\"datePublished\":\"2022-02-09T16:28:44+00:00\",\"dateModified\":\"2023-09-06T16:38:29+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\"},\"description\":\"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component\",\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg\",\"width\":607,\"height\":409},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brands\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Onapsis\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/onapsis\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\",\"name\":\"Steph Napier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"caption\":\"Steph Napier\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge","description":"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/de\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/","og_locale":"de_DE","og_type":"article","og_title":"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge","og_description":"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component","og_url":"https:\/\/b2btechknowledge.net\/de\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/","og_site_name":"Techknowledge","article_published_time":"2022-02-09T16:28:44+00:00","article_modified_time":"2023-09-06T16:38:29+00:00","og_image":[{"width":607,"height":409,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg","type":"image\/jpeg"}],"author":"Steph Napier","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Steph Napier","Gesch\u00e4tzte Lesezeit":"1 Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/","url":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/","name":"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg","datePublished":"2022-02-09T16:28:44+00:00","dateModified":"2023-09-06T16:38:29+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd"},"description":"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component","breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg","width":607,"height":409},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Brands","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/"},{"@type":"ListItem","position":3,"name":"Onapsis","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/onapsis\/"},{"@type":"ListItem","position":4,"name":"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd","name":"Steph Napier","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","caption":"Steph Napier"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/1174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/comments?post=1174"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/1174\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media\/1173"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media?parent=1174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/categories?post=1174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/tags?post=1174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}