CVE-2021-33672
📋 TL;DR
CVE-2021-33672 is a critical cross-site scripting (XSS) vulnerability in SAP Contact Center's Communication Desktop component that allows remote code execution. Attackers can send malicious chat messages that execute scripts in the recipient's browser, and due to ActiveX usage, can escalate to full operating system command execution. This affects organizations using SAP Contact Center version 700.
💻 Affected Systems
- SAP Contact Center Communication Desktop
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of chat recipient's system leading to data theft, system takeover, and potential lateral movement across the network.
Likely Case
Attacker gains control of individual user workstations, steals credentials, and accesses sensitive data within the chat system's scope.
If Mitigated
Limited to chat system disruption or minor data exposure if proper network segmentation and endpoint protection are in place.
🎯 Exploit Status
Exploitation requires sending a chat message, which may require some level of access, but the technical complexity is low once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply SAP Note 3073891
Vendor Advisory: https://launchpad.support.sap.com/#/notes/3073891
Restart Required: Yes
Instructions:
1. Download and apply SAP Note 3073891 patch. 2. Restart the SAP Contact Center Communication Desktop service. 3. Verify the patch is applied by checking the component version.
🔧 Temporary Workarounds
Disable ActiveX in Communication Desktop
windowsPrevents escalation from XSS to OS command execution by disabling ActiveX controls in the application settings.
Configure via SAP Contact Center admin interface: Navigate to Security Settings > Disable ActiveX
Restrict Chat Functionality
allTemporarily disable or limit chat features to authorized users only until patching is complete.
Use SAP Contact Center admin console to disable external chat or implement access controls
🧯 If You Can't Patch
- Isolate affected systems from critical networks to limit lateral movement.
- Implement strict endpoint security controls and monitor for unusual process execution.
🔍 How to Verify
Check if Vulnerable:
Check if SAP Contact Center Communication Desktop version 700 is installed and ActiveX is enabled in the configuration.
Check Version:
Use SAP transaction code SM51 or check the application's about dialog for version information.
Verify Fix Applied:
Verify that SAP Note 3073891 is applied by checking the patch status in the SAP system or confirming the component version is updated.
📡 Detection & Monitoring
Log Indicators:
- Unusual chat message patterns or script tags in chat logs
- Unexpected process executions from the Communication Desktop application
Network Indicators:
- Suspicious outbound connections from chat client systems to unknown IPs
SIEM Query:
source="sap_chat_logs" AND message="*<script>*" OR process="cmd.exe" parent="CommunicationDesktop.exe"