6 Critical SAP HANA Vulns Cant Be Fixed With Patches

  /     /     /  
Publicated : 22/11/2024   Category : security


6 Critical SAP HANA Vulns Cant Be Fixed With Patches


Onapsis releases 21 SAP HANA security advisories, including some Trexnet vulnerabilities that require upgrades and reconfigurations.



Researchers at Onapsis today released an unprecedented 21 security advisories for all SAP HANA-based applications, including eight critical vulnerabilities, six of which cannot be fixed by simple patches.
Collectively, the critical vulnerabilities can be exploited remotely and enable attackers to execute code, move files, delete data, completely compromise the system, access and manage business-relevant data and processes, and render all SAP systems unavailable.
SAP HANA is the in-memory processing technology that powers some of the biggest big-data analytics projects, as well as SAPs other business products, including customer relationship management (CRM), enterprise resource planning (ERP), and product lifecycle management (PLM) systems.
Onapsis CTO Juan Pablo Perez-Etchegoyen says most enterprises are not just running one SAP product. Typically, theyre running the whole suite. ... What happens if one of these systems goes down, when you have so many processes going to this system?
The impact of an SAP outage or compromise will vary by company and by what SAP applications they use, says Etchegoyen, but one Onapsis customer told him last year that a SAP outage could cost its company
$22 million
 per
minute
.
Six of the critical vulnerabilities of gravest concern are due to a configuration problem, and therefore cannot be fixed just by patching, he says. They affect the TREXnet protocol, used by the HANA Databases TREX servers -- NameServer, Preprocessor, IndexServer, StatisticsServer, WebDispatcher, XSEngine, or CompileServer -- to communicate with one another. If the TREXnet communication is not secured with authentication, attackers can exploit a variety of vulnerabilities by sending specially crafted packets to these TREX server ports. Those vulnerabilities are:
Trexnet remote file write
-- override relevant info and render system unavailable due to corrupted data
Trexnet remote directory deletion
-- delete info and render system unavailable
Trexnet remote file deletion
-- delete data, affect integrity, and potentially render system unavailable
Trexnet file move
-- relocate info stored in system so its easy to access; it could also potentially render the system unavailable due to a non-integral file system
Trexnet remote command execution
-- completely compromise the system and would be able to access and manage any business-relevant information or processes, execute commands with admin privileges
Trexnet remote Python execution
-- completely compromise the system and would be able to access and manage any business-relevant information or processes; executing arbitrary Python modules in SAP HANA with admin privileges
To close those holes, users need to upgrade to the latest version of the software and reconfigure their settings to enable strong authentication and encryption measures on TREXnet.
There are another two critical vulnerabilities in the HANA Database due to incorrect calculation of buffer size:
HTTP remote code execution.
By sending specially crafted HTTP packets to SAP HANA XSServer, a remote, unauthenticated attacker could completely compromise the system, access and manage business-relevant information and processes. This could be achieved remotely and potentially through the Internet, affecting on-premise and cloud-based HANA solutions.
SQL remote code execution.
By sending specially crafted packets to SQL interfaces, attackers could compromise the platform, executing arbitrary code or performing a denial of service attack, completely compromise system, access and manage business-relevant information and processes.
In addition to the critical ones, Onapsis release also contains six high-severity and seven medium-severity vulnerabilities.
Exacerbating the problem is the fact that while many of businesses core processes run on SAP systems, information security teams have very little visibility into these systems and how theyre secured, according to Etchegoyen. 
We still have these two teams separated, says Etchegoyen. Thats something were trying to evangelize. They need to have more communication between those two teams.

Last News

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
6 Critical SAP HANA Vulns Cant Be Fixed With Patches