CVE-2021-38163

9.9 CRITICAL

📋 TL;DR

CVE-2021-38163 is a critical vulnerability in SAP NetWeaver Visual Composer that allows authenticated non-administrative users to upload malicious files and execute arbitrary operating system commands with Java Server process privileges. This affects SAP NetWeaver Visual Composer 7.0 RT versions 7.30 through 7.50. Attackers can read/modify server data or shut down the system entirely.

💻 Affected Systems

Products:
  • SAP NetWeaver Visual Composer 7.0 RT
Versions: 7.30, 7.31, 7.40, 7.50
Operating Systems: Any OS running SAP NetWeaver (typically Windows Server or Linux)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary OS commands, read/modify all server data, install persistent backdoors, and cause permanent system unavailability.

🟠

Likely Case

Attackers gain full control of affected SAP servers, potentially leading to data theft, ransomware deployment, or service disruption.

🟢

If Mitigated

With proper network segmentation and strict access controls, impact limited to isolated SAP environment with no lateral movement to critical systems.

🌐 Internet-Facing: HIGH - If SAP NetWeaver is exposed to the internet, attackers can exploit this after obtaining any valid user credentials.
🏢 Internal Only: HIGH - Even internally, any authenticated user can exploit this vulnerability to gain full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials but is straightforward once authenticated. CISA has confirmed active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3084487

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3084487

Restart Required: Yes

Instructions:

1. Download SAP Security Note 3084487 from SAP Support Portal. 2. Apply the note to affected SAP NetWeaver systems. 3. Restart the Java Server process. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Restrict File Upload Permissions

all

Temporarily restrict file upload capabilities for non-administrative users in Visual Composer

Configure SAP authorization objects to deny S_GUI and S_DEVELOP permissions for file upload functions

Network Segmentation

all

Isolate SAP NetWeaver systems from critical infrastructure

Implement firewall rules to restrict SAP server network access to only necessary systems

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP systems from critical infrastructure
  • Enforce least privilege access controls and monitor all authenticated user activity
  • Deploy application-level firewalls to detect and block malicious file upload attempts
  • Implement comprehensive logging and monitoring for file upload activities

🔍 How to Verify

Check if Vulnerable:

Check SAP system version and verify if SAP Security Note 3084487 is applied. Use transaction SNOTE to check note implementation status.

Check Version:

In SAP GUI, use transaction SM51 to check SAP system version and kernel release.

Verify Fix Applied:

Verify SAP Security Note 3084487 is successfully implemented using transaction SNOTE. Test that non-admin users cannot upload files that trigger OS command execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activities in Visual Composer logs
  • Java Server process executing unexpected OS commands
  • Multiple failed authentication attempts followed by successful login and file upload

Network Indicators:

  • Unusual outbound connections from SAP server to external systems
  • Large file uploads to SAP Visual Composer endpoints
  • Traffic patterns indicating command and control communication

SIEM Query:

source="sap_logs" AND (event="file_upload" OR event="command_execution") AND user!="administrator"

🔗 References

📤 Share & Export