PatchSiren

PatchSiren cyber security CVE debrief

CVE-2022-22536 SAP CVE debrief

CVE-2022-22536 is a SAP HTTP request smuggling vulnerability that CISA added to its Known Exploited Vulnerabilities catalog on 2022-08-18. Because it is in KEV, organizations should treat it as actively exploited risk and prioritize vendor updates over routine maintenance windows. CISA’s entry specifies that the required action is to apply updates per vendor instructions.

Vendor
SAP
Product
Multiple Products
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-08-18
Original CVE updated
2022-08-18
Advisory published
2022-08-18
Advisory updated
2022-08-18

Who should care

SAP administrators, security teams, and asset owners responsible for SAP products, especially environments that expose SAP services to users or external networks. Organizations that need a SAP account to access patch materials should account for that operational requirement during remediation planning.

Technical summary

The available corpus identifies the issue as an HTTP request smuggling vulnerability affecting SAP multiple products. CISA classifies it as a known exploited vulnerability and directs affected users to apply vendor updates. No CVSS score or detailed affected-product list is included in the supplied source set, so remediation should be driven by the KEV listing and the vendor’s update guidance.

Defensive priority

High. KEV inclusion indicates known exploitation and sets a strong remediation urgency. The catalog entry date is 2022-08-18 and the due date is 2022-09-08, so affected SAP systems should be prioritized for patching and verification.

Recommended defensive actions

  • Inventory SAP products and services that may be affected by the KEV-listed issue.
  • Apply SAP vendor updates as directed in the official remediation guidance.
  • Confirm whether administrative access or a SAP account is required to retrieve the patch and plan accordingly.
  • Validate that exposed SAP services are patched and monitor for unusual HTTP request patterns after remediation.
  • Use the CISA KEV catalog entry and the official SAP guidance as the primary remediation references.

Evidence notes

The source corpus contains a CISA KEV entry for CVE-2022-22536 naming SAP as the vendor project, Multiple Products as the product scope, and "HTTP Request Smuggling Vulnerability" as the vulnerability name. CISA’s required action is "Apply updates per vendor instructions." The KEV metadata also notes that SAP users must have an account to log in and access the patch. No CVSS score, exploit details, or affected-product breakdown beyond the KEV listing were supplied.

Official resources

Publicly listed by CISA as a Known Exploited Vulnerability on 2022-08-18; known ransomware campaign use is listed as Unknown in the supplied corpus.