CVE-2022-22530

8.1 HIGH

📋 TL;DR

This vulnerability in SAP S/4HANA's F0743 Create Single Payment application allows attackers with basic user rights to upload malicious files without validation. This could lead to code execution, data modification, or complete system compromise. All SAP S/4HANA users with the affected application are at risk.

💻 Affected Systems

Products:
  • SAP S/4HANA
Versions: 100, 101, 102, 103, 104, 105, 106
Operating Systems: All supported SAP S/4HANA OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires basic user rights to the F0743 Create Single Payment application. All standard installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the SAP S/4HANA system, allowing attackers to execute arbitrary code, modify critical financial data, or disrupt business operations entirely.

🟠

Likely Case

Attackers upload malicious files to execute code, steal sensitive data, or modify payment information, potentially leading to financial fraud or data breaches.

🟢

If Mitigated

With proper file validation and access controls, the risk is reduced to unauthorized file uploads that don't execute, though data integrity could still be affected.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but only basic user privileges. The vulnerability is straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3112928

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3112928

Restart Required: Yes

Instructions:

1. Download SAP Note 3112928 from SAP Support Portal. 2. Apply the correction instructions provided in the note. 3. Restart the affected SAP S/4HANA system. 4. Verify the fix by testing file upload functionality.

🔧 Temporary Workarounds

Disable F0743 Application

all

Temporarily disable the vulnerable Create Single Payment application until patching can be completed.

Use SAP transaction SU01 to modify user authorizations and remove access to F0743

Implement File Upload Restrictions

all

Configure web application firewall or SAP security settings to block suspicious file uploads.

Configure SAP security settings to validate file types and content before processing

🧯 If You Can't Patch

  • Implement strict access controls to limit who can use the F0743 application to only essential personnel
  • Deploy network segmentation to isolate SAP S/4HANA systems and monitor all file upload activities

🔍 How to Verify

Check if Vulnerable:

Check if SAP S/4HANA version is 100-106 and if F0743 application is installed and accessible to users.

Check Version:

Execute SAP transaction SM51 to check system version and applied notes

Verify Fix Applied:

Verify SAP Note 3112928 is applied and test file upload functionality in F0743 to confirm validation is working.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activities in F0743 application logs
  • Multiple failed or suspicious file upload attempts
  • Unauthorized access attempts to payment functions

Network Indicators:

  • Unusual outbound connections from SAP servers following file uploads
  • Large or unexpected file transfers to/from SAP systems

SIEM Query:

source="sap_logs" AND (app="F0743" AND (event="file_upload" OR event="payment_create")) AND file_type NOT IN ("approved_types")

🔗 References

📤 Share & Export