Cyber security news for all


    SAP systems are often configured incorrectly and are therefore vulnerable

    Many SAP installations are vulnerable to critical security holes. The Cyber ​​Security and Digital Infrastructure Bureau is now warning of increased threats from attacks on known vulnerabilities and misconfigurations in SAP systems. With the release of an exploit kit called 10KBLAZE, it is now very easy to compromise such systems. Onapsis estimates that 9 of 10 SAP installations worldwide with more than 50,000 customers are affected.

    10KBLAZE Abuses A Number Of Security Gaps

    In its security report, the CISA lists three main points of attack. Access control lists of a SAP gateway are often configured incorrectly, which means that users who are not logged in can execute commands on the operating system. The factory setting of the gateway’s secinfo configuration can also be misused, execute commands remotely. In certain situations, an attacker could abuse a SAP router to gain access to an external network, which could lead to the execution of malicious code from the public network. At the security conference, at which 10KBLAZE tools were published, just under a thousand SAP routers vulnerable to such attacks can be found on the internet.

    SAP systems

    The standard settings of the SAP Message Server are also susceptible to misuse. An attacker in the SAP network can carry out the attacks with such a server and thus obtain legitimate login data. Some of these servers can also be reached from the public internet through incorrect network configuration. Further information on the attacks and how to detect them can be found in the CISA security message. In principle, the Cyber Security And Digital Infrastructure Bureau recommends to securing it through better configuration of the SAP components, also restricting access options from external networks. SAP systems are not designed to be exposed to the internet because it is an untrustworthy network.

    Onapsis experts estimate that around 90% of all SAP systems are affected by the security vulnerabilities. 10KBLAZE misuses incorrect configurations within the SAP systems, so that an unauthorized user can execute commands for which he is not authorized. This can happen if the SAP gateways are configured incorrectly. This attack is one of the three main types of attack reported by the CISA. Even the factory setting of the gateway’s secinfo configuration allows it to execute commands remotely.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]