CVE-2022-29611

8.8 HIGH

📋 TL;DR

CVE-2022-29611 is an authorization bypass vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform that allows authenticated users to escalate privileges without proper authorization checks. This affects organizations running vulnerable SAP systems, potentially enabling unauthorized access to sensitive functions and data.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server for ABAP
  • SAP ABAP Platform
Versions: Multiple versions - check SAP Note 3165801 for specific affected versions
Operating Systems: All supported OS platforms for SAP NetWeaver
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; affects standard configurations without additional authorization controls.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain administrative privileges, access sensitive business data, modify critical configurations, or disrupt business operations.

🟠

Likely Case

Privileged users could perform unauthorized actions beyond their assigned roles, potentially accessing or modifying sensitive business data.

🟢

If Mitigated

With proper network segmentation, monitoring, and least privilege principles, impact would be limited to specific application functions rather than full system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but authorization bypass is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3165801

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3165801

Restart Required: Yes

Instructions:

1. Download SAP Note 3165801 from SAP Support Portal. 2. Apply the correction instructions per SAP standard procedures. 3. Restart affected SAP systems. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Implement strict authorization controls

all

Enforce least privilege principles and review all user authorizations to minimize potential impact.

Network segmentation

all

Restrict access to SAP systems to only authorized networks and users.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which users can access SAP systems
  • Enable detailed logging and monitoring for authorization failures and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if SAP Security Note 3165801 is applied in your system using transaction SNOTE or by checking system patch status.

Check Version:

Use SAP transaction SM51 or SM50 to check system details and applied notes.

Verify Fix Applied:

Verify SAP Note 3165801 is marked as implemented in transaction SNOTE and test authorization controls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authorization attempts
  • Failed authorization checks followed by successful privileged operations
  • User performing actions outside assigned roles

Network Indicators:

  • Unusual patterns of SAP GUI or RFC connections from non-standard sources

SIEM Query:

Search for SAP security audit logs showing authorization bypass patterns or privilege escalation attempts.

🔗 References

📤 Share & Export