50,000 enterprise firms running SAP software vulnerable to attack

SAP: A look at its challenges, opportunities
ZDNet’s Larry Dignan caught up with Vinnie Mirchandani, author of SAP Nation 3.0, to talk about the enterprise software landscape and the evolution of one of enterprise software’s largest vendors.

Up to 50,000 enterprises that have adopted SAP solutions may be susceptible to cyberattacks due to new exploits targeting configuration flaws in the software, researchers say.

According to the cybersecurity team from the Onapsis Research Labs, exploits dubbed 10KBlaze which target two technical components of SAP software have been recently released and can lead to the “full compromise” of SAP applications.

In a report detailing the exploits, Onapsis said such compromises include the deletion of business-critical application data, as well as the theft or modification of sensitive information.

See also: SAP Q1 2019: First quarter operating profit slammed by restructuring hit

The “10KBlaze” tools could also be used to create new users with arbitrary privileges, to perform business functions such as creating new vendors or purchase orders — in other words, to commit financial fraud — and to gain access to SAP databases or disrupt business operations. 

Without any form of authentication, remote attackers only need some technical knowledge and network connectivity to the vulnerable system to perform an attack.

All SAP NetWeaver Application Server (AS) and S/4HANA systems, as they use an Access Control List in Gateway and a Message Server, may be at risk. The researchers say that the applications are impacted, among others:

  • SAP Enterprise Resource Planning (ERP)
  • SAP Product Lifecycle Management (PLM)
  • AP Customer Relationship Management (CRM)
  • SAP Human Capital Management (HCM)
  • SAP Supply Chain Management (SCM)
  • SAP Supplier Relationship Management (SRM)
  • SAP NetWeaver Business Warehouse (BW)
  • SAP Business Intelligence (BI)
  • SAP Process Integration (PI)
  • SAP Solution Manager (SolMan)
  • SAP Governance, Risk & Compliance 10.x (GRC)
  • SAP NetWeaver ABAP Application Server 7.0 – 7.52

The exploits do not rely on core vulnerabilities in SAP code. Rather, errors in SAP NetWeaver installation administrative configuration and settings can be used to compromise applications.

CNET: SAP says business can solve the world’s problems (really)

According to Onapsis, up to 50,000 companies and a collective one million systems using SAP NetWeaver and S/4HANA are misconfigured. The team estimates that 90 percent of SAP systems in use by the enterprise may be vulnerable.

“If these configurations are not secured, as recommended by SAP (easier to do during implementation and GoLive process), [the] recently published exploits can be used against affected companies,” Onapsis says.

TechRepublic: Deloitte collaboration could make it easier to migrate SAP apps to Google Cloud

SAP has previously released guidelines in 2005, 2009, and 2010 to customers which describe how to properly setup application configuration to prevent exploit. It is recommended that IT teams check their builds immediately to ensure they are protected.

“SAP always strongly recommends to install security fixes as they are released,” SAP said.

Previous and related coverage

Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0

Source Article from https://www.zdnet.com/article/50000-enterprise-firms-running-sap-software-vulnerable-to-attack/#ftag=RSSbaffb68
50,000 enterprise firms running SAP software vulnerable to attack
Latest blogs for ZDNet
Latest blogs for ZDNet

Article written by

great guy, love the news