CVE-2018-2368

9.8 CRITICAL

📋 TL;DR

CVE-2018-2368 is a critical authentication bypass vulnerability in SAP NetWeaver System Landscape Directory (LM-CORE) that allows unauthenticated attackers to access functionalities requiring user identity. This affects SAP NetWeaver versions 7.10 through 7.40. Organizations running these SAP systems without proper authentication checks are vulnerable to unauthorized access.

💻 Affected Systems

Products:
  • SAP NetWeaver System Landscape Directory (LM-CORE)
Versions: 7.10, 7.20, 7.30, 7.31, 7.40
Operating Systems: All supported SAP NetWeaver platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable unless patched. The vulnerability exists in the core authentication mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to access sensitive business data, modify system configurations, or disrupt SAP operations across the enterprise landscape.

🟠

Likely Case

Unauthorized access to sensitive system information, potential data leakage, and ability to manipulate system landscape directory data affecting business processes.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls are implemented, though the vulnerability still exists at the application layer.

🌐 Internet-Facing: HIGH - If exposed to internet, attackers can directly exploit without authentication from anywhere.
🏢 Internal Only: HIGH - Even internally, any user or compromised system on the network could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated access, making exploitation straightforward. While no public PoC exists, the nature of the flaw makes weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 2565622

Vendor Advisory: https://launchpad.support.sap.com/#/notes/2565622

Restart Required: Yes

Instructions:

1. Download SAP Security Note 2565622 from SAP Support Portal. 2. Apply the note using SAP Note Assistant or transaction SNOTE. 3. Restart the affected SAP NetWeaver System Landscape Directory services.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to SAP NetWeaver System Landscape Directory to only trusted systems and administrators.

Use firewall rules to limit access to TCP ports used by SAP NetWeaver SLD (typically 50000-50050)

Application Layer Filtering

all

Implement web application firewall rules to block unauthenticated access attempts to SLD services.

Configure WAF rules to require authentication headers for SLD endpoints

🧯 If You Can't Patch

  • Isolate the SAP NetWeaver System Landscape Directory in a separate network segment with strict access controls
  • Implement additional authentication layers such as reverse proxy with authentication or VPN access requirements

🔍 How to Verify

Check if Vulnerable:

Check if SAP Security Note 2565622 is applied using transaction SNOTE or by checking system status in SAP GUI

Check Version:

In SAP GUI: System → Status → check SAP_BASIS and SAP_ABA component versions

Verify Fix Applied:

Verify the note is implemented and test authentication requirements for SLD functionalities

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to SLD services
  • Failed authentication logs followed by successful access
  • Unusual access patterns to SLD endpoints

Network Indicators:

  • Unusual traffic to SAP SLD ports from unauthorized sources
  • Authentication bypass attempts in HTTP/SOAP requests

SIEM Query:

source="sap_audit_log" AND (event="AUTH_FAILURE" OR event="UNAUTH_ACCESS") AND target="SLD"

🔗 References

📤 Share & Export