TIP: Click on subject to list as thread! ANSI
echo: anti_virus
to: All
from: Ben Ritchey
date: 2016-05-11 10:37:40
subject: CERT Exploit warning

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:

TA16-132A: Exploitation of SAP Business Applications
05/11/2016 07:31 AM EDT


Original release date: May 11, 2016

Systems Affected
Outdated or misconfigured SAP systems

Overview
At least 36 organizations worldwide are affected by an SAP vulnerability
[1]. Security researchers from Onapsis discovered indicators of
exploitation against these organizations’ SAP business applications.

The observed indicators relate to the abuse of the Invoker Servlet, a
built-in functionality in SAP NetWeaver Application Server Java systems
(SAP Java platforms). The Invoker Servlet contains a vulnerability that was
patched by SAP in 2010. However, the vulnerability continues to affect
outdated and misconfigured SAP systems.

Description
SAP systems running outdated or misconfigured software are exposed to
increased risks of malicious attacks.

The Invoker Servlet vulnerability affects business applications running on
SAP Java platforms.

SAP Java platforms are the base technology stack for many SAP business
applications and technical components, including:

SAP Enterprise Resource Planning (ERP),
SAP Product Lifecycle Management (PLM),
SAP Customer Relationship Management (CRM),
SAP Supply Chain Management (SCM),
SAP Supplier Relationship Management (SRM),
SAP NetWeaver Business Warehouse (BW),
SAP Business Intelligence (BI),
SAP NetWeaver Mobile Infrastructure (MI),
SAP Enterprise Portal (EP),
SAP Process Integration (PI),
SAP Exchange Infrastructure (XI),
SAP Solution Manager (SolMan),
SAP NetWeaver Development Infrastructure (NWDI),
SAP Central Process Scheduling (CPS),
SAP NetWeaver Composition Environment (CE),
SAP NetWeaver Enterprise Search,
SAP NetWeaver Identity Management (IdM), and
SAP Governance, Risk & Control 5.x (GRC).
The vulnerability resides on the SAP application layer, so it is
independent of the operating system and database application that support
the SAP system.

Impact
Exploitation of the Invoker Servlet vulnerability gives unauthenticated
remote attackers full access to affected SAP platforms, providing complete
control of the business information and processes on these systems, as well
as potential access to other systems.

Solution
In order to mitigate this vulnerability, US-CERT recommends users and
administrators implement SAP Security Note 1445998 and disable the Invoker
Servlet. For more mitigation details, please review the Onapsis threat
report [1].

In addition, US-CERT encourages that users and administrators:

Scan systems for all known vulnerabilities, such as missing security
patches and dangerous system configurations.
Identify and analyze the security settings of SAP interfaces between
systems and applications to understand risks posed by these trust
relationships.
Analyze systems for malicious or excessive user authorizations.
Monitor systems for indicators of compromise resulting from the
exploitation of vulnerabilities.
Monitor systems for suspicious user behavior, including both privileged and
non-privileged users.
Apply threat intelligence on new vulnerabilities to improve the security
posture against advanced targeted attacks.
Define comprehensive security baselines for systems and continuously
monitor for compliance violations and remediate detected deviations.
These recommendations apply to SAP systems in public, private, and hybrid
cloud environments.

Note: The U.S. Government does not endorse or support any particular
product or vendor.

References
[1] Onapsis Threat Report: Wild Exploitation & Cyber-Attacks on SAP
Business Applications
[2] SAP: Invoker Servlet
Revision History
May 11, 2016: Initial Release

------------------------------------------------------------------------------- -

This product is provided subject to this Notification and this Privacy
& Use policy.


------------------------------------------------------------------------------- -
A copy of this publication is available at www.us-cert.gov. If you need
help or have questions, please send an email to info{at}us-cert.gov. Do not
reply to this message since this email was sent from a notification-only
address that is not monitored. To ensure you receive future US-CERT
products, please add US-CERT{at}ncas.us-cert.gov to your address book.
OTHER RESOURCES:
Contact Us | Security Publications | Alerts and Tips | Related Resources
STAY CONNECTED:
Sign up for email updates

SUBSCRIBER SERVICES:
Manage Preferences  |  Unsubscribe  |  Help


------------------------------------------------------------------------------- -
This email was sent to Fido4cmech{at}lusfiber.net using GovDelivery, on behalf
of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray
Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 Powered by
GovDelivery

=== Cut ===


--
Keep the faith   :^)

   Ben  aka cMech  Web: http|ftp|telnet://cmech.dynip.com
                 Email: fido4cmech(at)lusfiber.net
              Home page: http://cmech.dynip.com/homepage/
           WildCat! Board 24/7  +1-337-984-4794  any BAUD 8,N,1

--- GoldED+/W32-MSVC
* Origin: FIDONet - The Positronium Repository (1:393/68)
SEEN-BY: 14/5 19/33 34/999 90/1 116/18 120/331 123/500 128/187 140/1 218/700
SEEN-BY: 230/150 249/303 261/38 100 266/404 267/155 280/1027 282/1056 292/907
SEEN-BY: 292/908 320/119 219 340/400 393/68 396/45 633/267 640/384 712/620 848
SEEN-BY: 770/1 801/161 189 2320/105
@PATH: 393/68 261/38 712/848 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.