CVE-2021-33701

9.1 CRITICAL

📋 TL;DR

This CVE describes a SQL injection vulnerability in SAP's DMIS Mobile Plug-In and S/4HANA systems that allows attackers with privileged account access to execute arbitrary SQL queries through the NDZT tool. Successful exploitation can lead to superuser account compromise, severely impacting confidentiality, integrity, and availability. Affected systems include specific versions of DMIS 2011, SAPSCORE 125, and S4CORE 102-105.

💻 Affected Systems

Products:
  • DMIS Mobile Plug-In
  • SAP S/4HANA
Versions: DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 710, 2011_1_731, 710, 2011_1_752, 2020, SAPSCORE 125, S4CORE 102, 102, 103, 104, 105
Operating Systems: Any OS running affected SAP components
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have access to a highly privileged account to reach the vulnerable NDZT tool interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with superuser privileges leading to data theft, data manipulation, service disruption, and potential lateral movement across the SAP landscape.

🟠

Likely Case

Privileged attacker gains unauthorized access to sensitive business data, modifies critical information, or disrupts SAP operations.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires privileged account access but uses simple SQL injection techniques. Public exploit details available in referenced disclosures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3078312

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3078312

Restart Required: Yes

Instructions:

1. Download and apply SAP Note 3078312 through SAP Support Portal. 2. Apply the correction to affected systems. 3. Restart SAP systems to activate changes. 4. Verify the fix is properly applied.

🔧 Temporary Workarounds

Restrict NDZT Tool Access

all

Limit access to the NDZT tool interface to only absolutely necessary administrative accounts.

Implement Input Validation

all

Add input validation and parameterized queries for NDZT tool queries.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access privileged accounts and the NDZT tool interface.
  • Deploy network segmentation to isolate SAP systems and monitor for suspicious SQL query patterns.

🔍 How to Verify

Check if Vulnerable:

Check system version against affected versions list and verify if SAP Note 3078312 is applied.

Check Version:

Use SAP transaction code SM51 or check system information in SAP GUI.

Verify Fix Applied:

Verify SAP Note 3078312 is successfully applied and test NDZT tool functionality with safe queries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in NDZT tool logs
  • Multiple failed authentication attempts followed by successful privileged access
  • Unexpected superuser account activity

Network Indicators:

  • Unusual database query traffic from SAP application servers
  • SQL error messages in network traffic

SIEM Query:

source="sap_logs" AND ("NDZT" OR "superuser" OR "privileged") AND (sql OR query OR injection)

🔗 References

📤 Share & Export