CVE-2022-22544

9.1 CRITICAL

📋 TL;DR

CVE-2022-22544 is a privilege escalation vulnerability in SAP Solution Manager Diagnostics Root Cause Analysis Tools version 720 that allows administrators to execute arbitrary code on connected Diagnostics Agents and browse files on their systems. This missing segregation of duty enables attackers with administrator access to control managed systems, potentially leading to full compromise of connected infrastructure. Organizations using SAP Solution Manager 720 with Diagnostics Agents are affected.

💻 Affected Systems

Products:
  • SAP Solution Manager
  • SAP Diagnostics Root Cause Analysis Tools
Versions: Version 720
Operating Systems: All platforms running SAP Solution Manager
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator access to SAP Solution Manager and connected Diagnostics Agents. The vulnerability exists in the Diagnostics Root Cause Analysis component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all connected Diagnostics Agents leading to lateral movement across the enterprise, sensitive data exfiltration, ransomware deployment, and persistent backdoor installation across managed systems.

🟠

Likely Case

Unauthorized command execution on managed systems resulting in sensitive information disclosure, configuration tampering, and potential denial of service through resource exhaustion.

🟢

If Mitigated

Limited impact through proper network segmentation and strict access controls, though the vulnerability still presents significant risk if administrator credentials are compromised.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator-level access to SAP Solution Manager. Once obtained, the attack is straightforward as it leverages built-in functionality with insufficient access controls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3140940

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3140940

Restart Required: Yes

Instructions:

1. Download and apply SAP Note 3140940. 2. Restart SAP Solution Manager services. 3. Verify the patch is applied correctly. 4. Test functionality to ensure no disruption to business processes.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit SAP Solution Manager administrator accounts to only trusted personnel and implement multi-factor authentication.

Network Segmentation

all

Isolate SAP Solution Manager and Diagnostics Agents from critical systems using firewalls and network segmentation.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for SAP Solution Manager administrator accounts
  • Segment network to limit Diagnostics Agent communication to only necessary systems

🔍 How to Verify

Check if Vulnerable:

Check if SAP Solution Manager version 720 is installed and if SAP Note 3140940 has not been applied.

Check Version:

Transaction ST03 in SAP GUI or check system information in SAP Solution Manager administration

Verify Fix Applied:

Verify SAP Note 3140940 is applied in SAP Solution Manager administration console and test that administrator commands to Diagnostics Agents are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator activity in SAP Solution Manager logs
  • Unexpected command execution on Diagnostics Agents
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual network traffic from SAP Solution Manager to multiple Diagnostics Agents
  • Unexpected outbound connections from managed systems

SIEM Query:

source="sap_solution_manager" AND (event_type="admin_command" OR user="*admin*") AND dest_ip IN (diagnostics_agent_ips)

🔗 References

📤 Share & Export