CVE-2021-33676

7.2 HIGH

📋 TL;DR

CVE-2021-33676 is a missing authority check vulnerability in SAP CRM that allows authenticated attackers with high privileges to bypass authorization controls. This could lead to unauthorized access to sensitive data or system functions. The vulnerability affects SAP CRM versions 700 through 714.

💻 Affected Systems

Products:
  • SAP CRM
Versions: 700, 701, 702, 712, 713, 714
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have high privileges; standard installations are vulnerable without specific patches.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with high privileges could gain complete control over the SAP CRM system, accessing all data, modifying configurations, or disrupting business operations.

🟠

Likely Case

Privileged users could abuse their access to view or modify data beyond their intended authorization scope, potentially leading to data breaches or fraud.

🟢

If Mitigated

With strict privilege management and monitoring, impact is limited to authorized users misusing their legitimate access within controlled boundaries.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with high privileges; no public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3066316

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3066316

Restart Required: Yes

Instructions:

1. Download SAP Note 3066316 from SAP Support Portal. 2. Apply the correction instructions provided in the note. 3. Restart the SAP CRM system. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Privilege Reduction

all

Reduce the number of users with high privileges to minimize attack surface.

Enhanced Monitoring

all

Implement strict monitoring of privileged user activities and authorization checks.

🧯 If You Can't Patch

  • Implement strict role-based access control and least privilege principles
  • Enable comprehensive logging and monitoring of all privileged user activities

🔍 How to Verify

Check if Vulnerable:

Check SAP CRM version against affected versions list (700-714) and verify if SAP Note 3066316 is applied.

Check Version:

Transaction code SM51 or check system information in SAP GUI

Verify Fix Applied:

Verify that SAP Note 3066316 is successfully applied in the system and test authorization controls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authorization bypass attempts
  • Privileged user accessing unauthorized transactions

Network Indicators:

  • Unusual patterns in SAP CRM traffic from privileged accounts

SIEM Query:

source="sap_crm" AND (event_type="authorization_failure" OR user_privilege="high")

🔗 References

📤 Share & Export