SAP has recently rolled out its August 2024 security patch update in response to a series of critical vulnerabilities discovered in its systems. This update addresses 17 new security flaws that pose significant risks, potentially allowing attackers to bypass authentication mechanisms and gain complete control over affected systems.
In-depth Analysis of the Key Vulnerabilities Identified
Two of the most severe vulnerabilities highlighted in this update are CVE-2024-41730 and CVE-2024-29415. Both are rated highly on the Common Vulnerability Scoring System (CVSS) scale, with scores of 9.8 and 9.1 respectively, indicating a grave risk of exploitation.
- CVE-2024-41730: This flaw affects SAP BusinessObjects Business Intelligence Platform versions 430 and 440. It stems from a “missing authentication check” in a REST endpoint. If a system has Single Sign-On (SSO) enabled, an unauthorized user could exploit this vulnerability to obtain a valid login token, granting them full access to the system. This could lead to significant impacts on confidentiality, integrity, and availability.
- CVE-2024-29415: This vulnerability impacts applications built with SAP Build Apps versions older than 4.11.130. It is classified as a server-side request forgery (SSRF) flaw due to a weakness in the ‘IP’ package for Node.js. Exploiting this flaw could allow attackers to execute arbitrary code on the targeted system, potentially leading to a complete system takeover.
High Severity Issues in the Latest SAP Update
In addition to the critical vulnerabilities, SAP’s August 2024 update addresses several high-severity issues:
- CVE-2024-42374: This XML injection issue affects the SAP BEx Web Java Runtime Export Web Service in versions BI-BASE-E 7.5, BI-BASE-B 7.5, BI-IBC 7.5, BI-BASE-S 7.5, and BIWEBAPP 7.5.
- CVE-2023-30533: This flaw relates to prototype pollution in SAP S/4 HANA, specifically within the Manage Supply Protection module, affecting library versions of SheetJS CE below 0.19.3.
- CVE-2024-34688: This vulnerability involves a Denial of Service (DoS) issue in SAP NetWeaver AS Java, particularly affecting the Meta Model Repository component version MMR_SERVER 7.5.
- CVE-2024-33003: This flaw involves information disclosure in SAP Commerce Cloud, impacting versions HY_COM 1808, 1811, 1905, 2005, 2105, 2011, 2205, and COM_CLOUD 2211.
Essential Recommendations for Businesses to mitigate risks
To safeguard your systems against these vulnerabilities, consider the following actions:
- Update Systems Immediately: Apply the latest patches released by SAP to address these vulnerabilities. Prioritize updating all affected systems to ensure they are protected against known threats.
- Review Security Configurations: Examine your security settings, especially those related to Single Sign-On (SSO) and access controls, to ensure they are correctly configured to prevent unauthorized access.
- Stay Informed: Keep up with security advisories from SAP and cybersecurity publications. Staying informed about the latest threats and vulnerabilities will help you respond promptly to emerging risks.
- Implement Additional Security Measures: Consider enhancing your security posture by implementing multi-factor authentication (MFA) and network segmentation. These measures can provide additional layers of protection against potential attacks.
- Evaluate Third-Party Software Security: Given the vulnerabilities in SAP Build Apps, assess the security of third-party software vendors and integrate security measures to mitigate risks associated with third-party solutions.
Conclusion
The recent vulnerabilities in SAP systems underscore the critical importance of timely patching and robust security practices. As cyber threats continue to evolve, businesses must prioritize a comprehensive security strategy that includes regular updates, strong security controls, and ongoing vigilance. By addressing these vulnerabilities promptly and adopting a proactive approach to cybersecurity, organizations can significantly reduce their risk of falling victim to cyberattacks. A well-rounded security strategy not only protects valuable data and systems but also fosters a culture of cybersecurity awareness within the organization, ensuring long-term resilience against evolving threats.

Discover more from Open Security Labs
Subscribe to get the latest posts sent to your email.







