{"id":1174,"date":"2022-02-09T16:28:44","date_gmt":"2022-02-09T16:28:44","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=1174"},"modified":"2023-09-06T16:38:29","modified_gmt":"2023-09-06T16:38:29","slug":"the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/fr\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/","title":{"rendered":"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications"},"content":{"rendered":"<h3><strong>Onapsis: Threat Report<\/strong><\/h3>\n<h3>Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component<\/h3>\n<p><strong>Executive Summary<\/strong><\/p>\n<p>Detailed research from the Onapsis Research Labs over the past year in HTTP Response Smuggling led to the discovery of a set of critical vulnerabilities affecting SAP applications actively using the SAP Internet Communication Manager (ICM), which we are referring to as ICMAD (Internet Communication Manager Advanced Desync). This discovery requires immediate attention by most SAP customers, given the widespread usage of the vulnerable technology component in SAP landscapes around the world.<\/p>\n<p>[dlm_gf_form download_id=1170 ajax=&#8221;true&#8221;]<\/p>","protected":false},"excerpt":{"rendered":"<p>Onapsis: Threat Report Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component Executive Summary Detailed research&#8230;<\/p>","protected":false},"author":25,"featured_media":1173,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16,31],"tags":[],"class_list":["post-1174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-technology","category-onapsis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge<\/title>\n<meta name=\"description\" content=\"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/fr\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/fr\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-09T16:28:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-06T16:38:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"607\" \/>\n\t<meta property=\"og:image:height\" content=\"409\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steph Napier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steph Napier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/\",\"url\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/\",\"name\":\"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg\",\"datePublished\":\"2022-02-09T16:28:44+00:00\",\"dateModified\":\"2023-09-06T16:38:29+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\"},\"description\":\"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component\",\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg\",\"width\":607,\"height\":409},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brands\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Onapsis\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/onapsis\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\",\"name\":\"Steph Napier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"caption\":\"Steph Napier\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge","description":"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/fr\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/","og_locale":"fr_FR","og_type":"article","og_title":"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge","og_description":"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component","og_url":"https:\/\/b2btechknowledge.net\/fr\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/","og_site_name":"Techknowledge","article_published_time":"2022-02-09T16:28:44+00:00","article_modified_time":"2023-09-06T16:38:29+00:00","og_image":[{"width":607,"height":409,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg","type":"image\/jpeg"}],"author":"Steph Napier","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Steph Napier","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/","url":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/","name":"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg","datePublished":"2022-02-09T16:28:44+00:00","dateModified":"2023-09-06T16:38:29+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd"},"description":"Mitigating the Risk of New Vulnerabilities Affecting the SAP Internet Communication Manager Component","breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Onapsis-Threat-Report-e1646834631534.jpg","width":607,"height":409},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/the-icmad-vulnerabilities-who-is-at-risk-and-how-to-protect-your-business-critical-sap-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Brands","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/"},{"@type":"ListItem","position":3,"name":"Onapsis","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/onapsis\/"},{"@type":"ListItem","position":4,"name":"The ICMAD Vulnerabilities: Who Is at Risk and How To Protect Your Business-Critical SAP\u00ae Applications"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd","name":"Steph Napier","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","caption":"Steph Napier"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/1174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/comments?post=1174"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/1174\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media\/1173"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media?parent=1174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/categories?post=1174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/tags?post=1174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}