Security Market Segment LS
Wednesday, 07 April 2021 10:18

SAP vulnerabilities being weaponised in less than 72 hours Featured

SAP vulnerabilities being weaponised in less than 72 hours Pixabay

A threat intelligence report from security provider Onapsis and business software vendor SAP claims that threat actors are actively exploiting unprotected mission-critical SAP applications.

Coming under attack were applications that handled enterprise resource planning, supply chain management, human capital management, product lifecycle management and customer relationship management, the 26-page report said.

This was important as 92% of the Forbes Global 2000 had standardised on SAP to power their operations. "With more than 400,000 organisations using SAP, 77% of the world’s transactional revenue touches an SAP system," the report said.

"These organisations include the vast majority of pharmaceutical, critical infrastructure and utility companies, food distributors, defence and many more. An orchestrated and successful attack on unprotected SAP systems could have far-reaching consequences."

The report claimed there was conclusive evidence that cyber attackers were actively targeting and exploiting unsecured SAP applications, through varied techniques, tools and procedures and there were clear indications of sophisticated knowledge of mission-critical applications.

It said the window for defenders was significantly smaller than previously thought, with examples of SAP vulnerabilities being weaponised in less than 72 hours since the release of patches, and new unprotected SAP applications provisioned in cloud (IaaS) environments being discovered and compromised in less than three hours.

Successful exploitation of a vulnerable SAP system would allow an attacker to perform several malicious activities, including:

  • Steal personally identifiable information from employees, customers and suppliers;
  • Read, modify or delete financial records;
  • Change banking details (account number, IBAN number, etc.);
  • Administer purchasing processes;
  • Disrupt critical business operations, such as supply chain management, by corrupting data, shutting down processes completely or deploying ransomware;
  • Perform unrestricted actions through operating system command execution; and
  • Delete or modify traces, logs and other files.

"Observed exploitation could lead in many cases to full control of the unsecured SAP application, bypassing common security and compliance controls, and enabling attackers to steal sensitive information, perform financial fraud or disrupt mission-critical business processes by deploying ransomware or stopping operations,"the report said.

"These threats may also have regulatory compliance implications for organisations that have not properly secured their SAP applications processing regulated data."

The data captured was claimed to represent clear evidence of malicious activity across different threat actors and levels of operational capability:

  • Threat actors possess the domain expertise to carry out sophisticated attacks specific to mission-critical SAP applications – directly targeting sensitive data and critical processes;
  • Over 300 successful exploitations were observed over the course of this study, targeting vulnerabilities specific to SAP systems;
  • Attackers attempted accessing SAP systems to modify configurations and users and exfiltrate business information;
  • Exploit attempts have been observed in as little as 72 hours from the release of a patch, proving diligent and rapid patch prioritisation is required or countermeasures applied if patches cannot be applied in a timely manner;
  • New unprotected SAP applications provisioned in cloud (IaaS) environments were discovered and attacked in less than three hours, stressing the need to “shift left” and ensure new mission-critical applications are provisioned securely from day one;
  • Regulatory compliance for financial (Sarbanes-Oxley), privacy (GDPR) and other mandates may be at risk as unpatched and misconfigured SAP systems present a deficiency in IT controls that would result in audit and compliance violations and penalties;
  • Multiple brute-force attempts were made by attackers targeting high-privilege SAP user accounts—this observation showed that maintaining secure system configurations and monitoring for drift is important and must go hand-in-hand with patch management to keep SAP systems protected;
  • Sophisticated threat actors have been observed chaining together multiple vulnerabilities to target specific SAP applications to maximise impact and potential damage;
  • Although Internet-exposed systems are more likely to be exploited and compromised, threats have been observed that were equipped to compromise SAP systems from the inside in the past (not in the scope of this report);
  • With remote access to SAP systems and mission-critical applications, the need for lateral movement is nearly eliminated, enabling attackers to reach and exfiltrate business-critical data more quickly.

Scott Caveza, research engineering manager at security shop Tenable, said: "A recent advisory from CISA warns that unpatched or misconfigured SAP systems are actively being targeted by threat actors. SAP software is used by organisations to manage critical business functions and often used to store sensitive data.

"By leveraging known unpatched vulnerabilities, attackers can disrupt critical processes, steal financial or otherwise sensitive data, or deploy malicious code which can lead to a major impact on affected organisations.

"Over the last year, we have continued to see reports from US Government agencies warning of the threat of unpatched software and known vulnerabilities being targeted by threat actors.

"Despite patches being available for months and even years, attackers are still finding and exploiting unpatched SAP systems. This serves as a reminder to administrators of sensitive data and applications that applying patches, mitigations, or workarounds are paramount to thwarting malicious actors looking to exploit well known vulnerabilities."

Subscribe to ITWIRE UPDATE Newsletter here


The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.



iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.


Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News