Security

SAP: It takes exploit devs about 72 hours to turn one of our security patches into a weapon against customers

So please don't delay in applying updates, says, well, everyone


SAP and security analysts Onapsis say cyber-criminals are pretty quick to analyze the enterprise software outfit's patches and develop exploits to get into vulnerable systems.

In a joint report issued by the two organizations, Mariano Nunez, CEO of Onapsis, cited "conclusive evidence that cyberattackers are actively targeting and exploiting unsecured SAP applications," and warned time was of the essence, reporting "SAP vulnerabilities being weaponized in less than 72 hours since the release of patches."

For newly provisioned SAP applications in cloud environments, discovery and attack can occur in as little as three hours, the report says. However, the average time from the provisioning of a new SAP instance at cloud service provider to exploitation and compromise is just under a week.

And while, yes, patches are rapidly weaponized all the time in the information security world, it's interesting to see it quantified and highlighted by SAP.

In conjunction with the SAP/Onapsis alert, the US government's Cybersecurity and Infrastructure Agency (CISA) issued its own warning, stating "SAP systems running outdated or misconfigured software are exposed to increased risks of malicious attacks."

Beware the IDEs of March: Microsoft's latest monthly fixes land after frantic Exchange Server updates

READ MORE

The Feds said possible consequences of a successful attack include data theft, financial fraud, business process disruption, ransomware, and the highly undesirable "halt of all operations." Coming on the heels of the SolarWinds fiasco and recent attacks on Microsoft Exchange servers, perhaps such concern is warranted.

And given that SAP software is used at over 400,000 organizations and more than 1,000 government organizations, CISA interest in urging IT folk to try a bit harder has a certain logic to it.

The SAP/Onapsis report says that over 300 successful exploitation attempts on unprotected SAP instances have been documented since mid-2020. The attacks have made use of multiple vulnerabilities (CVEs) and insecure configurations.

That suggests organizations have actually been compromised as a result of this activity but that's not the case, SAP and Onapsis insist.

"The exploits were observed through the Onapsis Threat Intelligence Cloud and not on actual customer environments," an Onapsis spokesperson explained. "As a result, we do not have data on victims or impact on actual organizations."

Speed of software

What the security biz can provide with a bit more certainty is a timeline. For example, when the RECON flaw (CVE-2020-6287) was disclosed on July 14, 2020, proof-of-concept code surfaced on July 15, mass scanning began on July 16, and a functional public exploit appeared on July 17. That doesn't leave system administrators a lot of time to lounge around and weigh the pros and cons of applying the SAP patch.

Most of the observed attack attempts focused on the following CVEs, for which public exploits are available, mostly on GitHub: CVE-2010-5326, CVE-2018-2380, CVE-2016-3976, CVE-2016-9563, CVE-2020-6287, and CVE-2020-6207.

Onapsis did not provide attribution for any of the observed attack attempts, but did identify the general geographic origin of both automatic exploitation attempts and interactive login attempts:

The security firm's advice is about what you'd expect: identify any SAP applications vulnerable to these CVEs, test the fixes, and apply them pronto ... without breaking business-critical applications and lowering staff productivity, of course.

Also, don't forget to identify misconfigurations, excessive privileges, and other potential issues sooner rather than later.

It has even been thus. Sorry there's no happy ending. ®

Send us news
17 Comments

SAP transformation program a 'euphemism' for job cuts, claims European Works Council

8,000 roles affected worldwide, but Germany will bear heaviest losses

Microsoft slammed for lax security that led to China's cyber-raid on Exchange Online

CISA calls for 'fundamental, security-focused reforms' to happen ASAP, delaying work on other software

Rust developers at Google are twice as productive as C++ teams

Code shines up nicely in production, says Chocolate Factory's Bergstrom

Sleuths who cracked Zodiac Killer's cipher thank the crowd

Fifty-one years of community contributions, software, and clever cryptanalysis contributed

Meet clickjacking's slicker cousin, 'gesture jacking,' aka 'cross window forgery'

Web devs advised to do their part to limit UI redress attacks

Microsoft squashes SmartScreen security bypass bug exploited in the wild

Plus: Adobe, SAP, Fortinet, VMware, Cisco issue pressing updates

Malicious SSH backdoor sneaks into xz, Linux world's data compression library

STOP USAGE OF FEDORA RAWHIDE, says Red Hat while Debian Unstable and others also affected

US government excoriates Microsoft for 'avoidable errors' but keeps paying for its products

In what other sphere does a bad supplier not feel pain for its foulups?

UK county council misses deadline for £7.3M RISE with SAP system launch

Gloucestershire reluctant to set new date in S/4HANA migration saga

Majority of Americans now use ad blockers

We're dreaming of a white list, because we're just like the ones you used to know

Easy-to-use make-me-root exploit lands for recent Linux kernels. Get patching

CVE-2024-1086 turns the page tables on system admins

Microsoft rolls out safety tools for Azure AI. Hint: More models

Defenses against prompt injection, hallucination arrive as Feds eye ML risks