CVE-2023-27267

9.0 CRITICAL

📋 TL;DR

CVE-2023-27267 is an authentication bypass and input validation vulnerability in SAP Diagnostics Agent version 720 that allows remote attackers to execute arbitrary scripts on all connected agents. This affects SAP systems using the vulnerable Diagnostics Agent component. Attackers can compromise the entire system's confidentiality, integrity, and availability.

💻 Affected Systems

Products:
  • SAP Diagnostics Agent
Versions: Version 720
Operating Systems: All platforms running SAP Diagnostics Agent
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of SAP Diagnostics Agent version 720. The OSCommand Bridge component is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal sensitive data, disrupt operations, and maintain persistent access across all connected Diagnostics Agents.

🟠

Likely Case

Attackers with network access to vulnerable systems can execute arbitrary scripts, potentially leading to data exfiltration, system manipulation, or deployment of ransomware.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated segments, but internal attackers could still exploit the vulnerability.

🌐 Internet-Facing: HIGH if exposed to internet, as unauthenticated attackers can exploit this vulnerability remotely.
🏢 Internal Only: HIGH even internally, as the vulnerability requires no authentication and can be exploited by any network-accessible attacker.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

No authentication required, but attackers need knowledge of the system. The vulnerability is straightforward to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3305369

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3305369

Restart Required: Yes

Instructions:

1. Download and apply SAP Note 3305369. 2. Restart the SAP Diagnostics Agent service. 3. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SAP Diagnostics Agent ports to only trusted management networks.

Use firewall rules to block external access to Diagnostics Agent ports

Disable OSCommand Bridge

all

If not required, disable the vulnerable OSCommand Bridge component.

Consult SAP documentation for disabling specific bridge components

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP Diagnostics Agent from untrusted networks
  • Monitor for unusual process execution and network connections from Diagnostics Agent systems

🔍 How to Verify

Check if Vulnerable:

Check if SAP Diagnostics Agent version 720 is installed and if SAP Note 3305369 has not been applied.

Check Version:

Check SAP system documentation or agent configuration for version information

Verify Fix Applied:

Verify SAP Note 3305369 is applied and the Diagnostics Agent service has been restarted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual script execution from Diagnostics Agent
  • Authentication bypass attempts in agent logs
  • Unexpected process creation from agent services

Network Indicators:

  • Unusual outbound connections from Diagnostics Agent systems
  • Traffic to unexpected ports from agent hosts

SIEM Query:

source="sap_diagnostics_agent" AND (event="script_execution" OR event="auth_bypass")

🔗 References

📤 Share & Export