Advisory
On 10.01.2023 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within Kernel / ABAP.
SAP Note 3089413 addresses "[CVE-2023-0014] Capture-replay vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform" to prevent insufficient security function with a hot news risk for exploitation.
A workaround does exist, according to SAP Security Advisory team. It is advisable to implement the correction as project, the team suggests.
Risk specification
SAP NetWeaver ABAP Server and ABAP Platform do not create information about system identity in an unambiguous format. Malicious users may exploit this to obtain illegitimate access to the system.Solution
By this correction the system identification becomes unique and the system identification will be used and evaluated correctly in trusted-trusting communication scenarios. SAP (credits to Frank Buchholz) released ABAP program ZCHECK_NOTE_3089413 (available for SolMan and FRun) to validate the efficiency for the correction. See https://github.com/SAP-samples/security-services-tools/blob/main/ABAP/solman/zcheck_note_3089413.prog.abap for full details. Circumstances exist that prevent the timely installation of a patch provided by the manufacturer. In such cases, you may consider applying the suggested workaround as a temporary or compensating mitigation: "There is no complete workaround. But the attack surface can be reduced by using encryption (HTTPS, SNC). Give no authorizations for direct table access to table RFCSYSACL,Activate database logging for table RFCSYSACL and check the log periodically.Restrict access to systems, network and network intermediates where trusted/trusting is used. ".
The advisory is valid for
- KERNEL 7.22 24
- KERNEL 7.53 36
- KERNEL 7.77 34
- KERNEL 7.81 24
- KERNEL 7.85 25
- KERNEL 7.89 16
- KRNL64NUC 7.22 30
- KRNL64NUC 7.22EXT 30
- KRNL64UC 7.22 30
- KRNL64UC 7.22EXT 30
- KRNL64UC 7.53 36
- SAP_BASIS 700-702 66
- SAP_BASIS 710-711 21
- SAP_BASIS 730 34
- SAP_BASIS 731 78
- SAP_BASIS 740 81
- SAP_BASIS 750-757 22
- 8.5 [CVE-2022-41268] Privilege escalation vulnerability in SAP Business Planning and Consolidation
- 6.7 [CVE-2022-35295] Privilege Escalation Vulnerability in SAPOSCOL on Unix
- 6.5 Information Disclosure vulnerability in SAP Business Client
- 6.3 [CVE-2021-21472] Server password not set during installation of SAP NetWeaver Master Data Management 7.1
- 5.4 [CVE-2020-6178] Insufficient session expiration in SAP Enable Now Manager