Advisory
On 08.12.2020 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within Java.
SAP Note 2971163 addresses "[CVE-2020-26816] Missing Encryption in SAP NetWeaver AS Java (Key Storage Service)" to prevent missing security function with a medium risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
This note has been re-released with updated ‘Support Packages & Patches’ information. The key material in the SAP NetWeaver AS Java Keystore service that is stored in database as DER encoded format is not encrypted. This enables an attacker with administrator access to decode the keys and get some application data and client credentials of adjacent systems.Solution
After the next system restart, the Key Storage data will be encrypted.
Affected System
SAP Netweaver Application Server Java is part of the SAP NetWeaver Application Platform. It provides the complete infrastructure for deploying and running Java applications.
- The AS Java Home: SAP Netweaver Application Server Java wiki
- A dedicated SAP NetWeaver 7.40 Application Server for Java Security Guide exists.
The advisory is valid for
- SERVERCORE 7.10 11
- SERVERCORE 7.11 11
- SERVERCORE 7.20 11
- SERVERCORE 7.30 12
- SERVERCORE 7.31 12
- SERVERCORE 7.40 11
- SERVERCORE 7.50 22
- 9.9 [CVE-2021-33698] Unrestricted File Upload vulnerability in SAP Business One
- 7.1 [CVE-2022-39801] Insufficient Firefighter Session Expiration in SAP GRC Access Control Emergency Access Management
- 6.5 [CVE-2024-34683] Unrestricted file upload in SAP Document Builder (HTTP service)
- 6.3 Unauthorized use of application functions in SAP GUI for HTML
- 5.8 [CVE-2024-45281] DLL hijacking vulnerability in SAP BusinessObjects Business Intelligence Platform