CVE-2022-28214

7.8 HIGH

📋 TL;DR

SAP BusinessObjects Enterprise Central Management Server (CMS) versions 420 and 430 expose authentication credentials in Sysmon event logs during updates. This information disclosure vulnerability allows attackers to obtain sensitive credentials, potentially compromising affected systems. Organizations running these specific SAP BusinessObjects versions are at risk.

💻 Affected Systems

Products:
  • SAP BusinessObjects Enterprise Central Management Server (CMS)
Versions: Versions 420 and 430
Operating Systems: Windows (since Sysmon is Windows-specific)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Sysmon is configured to log relevant events during CMS updates.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials, gain full control over SAP BusinessObjects systems, steal sensitive business data, and potentially pivot to other enterprise systems.

🟠

Likely Case

Attackers with access to Sysmon logs capture credentials and use them to access SAP BusinessObjects systems, potentially modifying reports, extracting data, or disrupting business operations.

🟢

If Mitigated

With proper access controls and monitoring, credential exposure is detected quickly, and compromised accounts are disabled before significant damage occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to Sysmon event logs, which typically requires some level of system access or privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 2998510

Vendor Advisory: https://launchpad.support.sap.com/#/notes/2998510

Restart Required: Yes

Instructions:

1. Download and apply SAP Note 2998510 patch. 2. Restart the Central Management Server service. 3. Verify the fix by checking that credentials no longer appear in Sysmon logs during updates.

🔧 Temporary Workarounds

Restrict Sysmon Log Access

windows

Limit access to Sysmon event logs to authorized administrators only.

wevtutil sl Microsoft-Windows-Sysmon/Operational /ca:O:BAG:SYD:(A;;0xf0005;;;SY)(A;;0x5;;;BA)(A;;0x1;;;S-1-5-32-573)(A;;0x1;;;NS)

Disable Sysmon Logging for CMS Updates

windows

Temporarily disable Sysmon logging during CMS update procedures.

sc stop Sysmon
sc start Sysmon

🧯 If You Can't Patch

  • Implement strict access controls on Sysmon event logs to prevent unauthorized viewing.
  • Monitor Sysmon logs for credential exposure and implement alerting for suspicious access patterns.

🔍 How to Verify

Check if Vulnerable:

Check Sysmon event logs (Event ID 1) during CMS updates for exposed credentials in command-line arguments.

Check Version:

Check SAP BusinessObjects version via Central Management Console or review installation logs.

Verify Fix Applied:

After applying patch, verify that credentials no longer appear in Sysmon logs during CMS update procedures.

📡 Detection & Monitoring

Log Indicators:

  • Clear-text credentials in Sysmon event logs (Event ID 1)
  • Unauthorized access attempts to Sysmon logs
  • Suspicious authentication patterns to CMS

Network Indicators:

  • Unusual authentication requests to CMS from unexpected sources

SIEM Query:

EventID=1 AND (CommandLine CONTAINS "password" OR CommandLine CONTAINS "pwd" OR CommandLine CONTAINS "cred")

🔗 References

📤 Share & Export