CVE-2022-32249

7.5 HIGH

📋 TL;DR

This vulnerability in SAP Business One integration with SAP HANA allows attackers to access HANA cockpit's data volume containing sensitive information like high-privileged credentials. It affects SAP Business One version 10.0 when integrated with SAP HANA. Attackers can exploit this to compromise administrative accounts and gain unauthorized access to critical systems.

💻 Affected Systems

Products:
  • SAP Business One
  • SAP HANA
Versions: SAP Business One version 10.0
Operating Systems: All platforms running SAP Business One 10.0
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects specific integration scenarios between SAP Business One and SAP HANA where HANA cockpit data volume is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative access to SAP HANA database, leading to data theft, manipulation, or destruction of business-critical information.

🟠

Likely Case

Exfiltration of sensitive credentials and business data, potentially enabling lateral movement within the SAP environment.

🟢

If Mitigated

Limited impact with proper access controls and network segmentation preventing unauthorized access to the HANA cockpit data volume.

🌐 Internet-Facing: MEDIUM - Requires specific integration scenario but could be exploited if vulnerable systems are exposed to untrusted networks.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to escalate privileges and access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific knowledge of SAP Business One and HANA integration scenarios and access to the affected environment.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3212997

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3212997

Restart Required: Yes

Instructions:

1. Download SAP Note 3212997 from SAP Support Portal. 2. Apply the security patch to SAP Business One version 10.0. 3. Restart affected SAP services. 4. Verify the patch is correctly applied.

🔧 Temporary Workarounds

Restrict access to HANA cockpit data volume

all

Implement strict access controls and network segmentation to limit who can access the HANA cockpit data volume.

Monitor sensitive data access

all

Enable detailed logging and monitoring for access to HANA cockpit data volume and sensitive credential storage.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP Business One and HANA systems from untrusted networks.
  • Enforce principle of least privilege and regularly rotate high-privileged account credentials.

🔍 How to Verify

Check if Vulnerable:

Check if running SAP Business One version 10.0 integrated with SAP HANA and verify if SAP Note 3212997 is applied.

Check Version:

Check SAP Business One version through administration tools or consult SAP documentation for version verification commands.

Verify Fix Applied:

Verify SAP Note 3212997 is installed and check version information in SAP Business One administration console.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to HANA cockpit data volume
  • Unusual credential access patterns
  • Failed authentication attempts followed by successful access

Network Indicators:

  • Unusual data transfers from HANA cockpit systems
  • Network traffic to sensitive data volumes from unexpected sources

SIEM Query:

source="sap_logs" AND (event_type="data_access" AND resource="hana_cockpit_volume") OR (event_type="authentication" AND user="privileged_account")

🔗 References

📤 Share & Export