CVE-2021-27628

7.5 HIGH

📋 TL;DR

CVE-2021-27628 is a denial-of-service vulnerability in SAP NetWeaver ABAP Server and ABAP Platform that allows unauthenticated attackers to crash the system by sending specially crafted network packets. The vulnerability exists in the Dispatcher component's DpRTmPrepareReq() method due to improper input validation. Affected organizations are those running vulnerable SAP NetWeaver versions with exposed network interfaces.

💻 Affected Systems

Products:
  • SAP NetWeaver ABAP Server
  • SAP NetWeaver ABAP Platform
Versions: KRNL32NUC: 7.22, 7.22EXT; KRNL32UC: 7.22, 7.22EXT; KRNL64NUC: 7.22, 7.22EXT, 7.49; KRNL64UC: 8.04, 7.22, 7.22EXT, 7.49, 7.53, 7.73; KERNEL: 7.22, 8.04, 7.49, 7.53, 7.73, 7.77, 7.81, 7.82, 7.83
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Dispatcher component specifically; requires network access to vulnerable service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability causing business disruption, requiring system restart and potential data loss from interrupted transactions.

🟠

Likely Case

Service disruption affecting SAP-dependent business processes until system restart.

🟢

If Mitigated

No impact if system is patched or network access is properly restricted.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing systems particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or malware could still exploit this to disrupt business operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Simple packet crafting required.

No authentication required; exploitation is straightforward once packet format is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3021197 patches

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3021197

Restart Required: Yes

Instructions:

1. Download and apply SAP Security Note 3021197 patches from SAP Support Portal. 2. Apply kernel updates to affected systems. 3. Restart SAP systems to activate patches. 4. Verify patch application using transaction SM51.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SAP Dispatcher service ports (typically 3200-3299, 3300-3399 for ABAP)

Use firewall rules to limit access to trusted IPs only

SAP Router Protection

all

Ensure SAP Router is properly configured and updated to filter malicious traffic

Maintain saprouttab file with authorized connections only

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach SAP Dispatcher ports
  • Monitor system logs for crash events and implement rapid response procedures

🔍 How to Verify

Check if Vulnerable:

Check kernel version using transaction SM51 or command 'disp+work -version'. Compare against affected versions list.

Check Version:

disp+work -version (on SAP application server)

Verify Fix Applied:

Verify SAP Security Note 3021197 is applied using transaction SNOTE or check kernel patch level.

📡 Detection & Monitoring

Log Indicators:

  • Dispatcher crash logs in dev_disp
  • System termination events in system logs
  • ABAP dumps indicating memory corruption

Network Indicators:

  • Unusual traffic patterns to SAP Dispatcher ports
  • Multiple connection attempts from single sources

SIEM Query:

source="sap_logs" AND ("dispatcher crash" OR "system terminated" OR "DpRTmPrepareReq")

🔗 References

📤 Share & Export