CVE-2023-27498

7.2 HIGH

📋 TL;DR

CVE-2023-27498 is a memory corruption vulnerability in SAP Host Agent (SAPOSCOL) version 7.22 that allows unauthenticated attackers with network access to the SAP Start Service port to send crafted requests. This can cause memory corruption leading to information disclosure about the server and temporary service unavailability. Organizations running vulnerable SAP Host Agent versions are affected.

💻 Affected Systems

Products:
  • SAP Host Agent (SAPOSCOL)
Versions: Version 7.22
Operating Systems: All platforms supported by SAP Host Agent
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the SAP Start Service port which is typically exposed by default in SAP installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could exploit this to cause denial of service, making critical SAP services temporarily unavailable, potentially disrupting business operations.

🟠

Likely Case

Attackers will most likely use this vulnerability to gather technical information about the server for reconnaissance purposes and cause temporary service interruptions.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to information disclosure about the affected service only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires network access to the SAP Start Service port but no authentication, making it relatively easy to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3275727

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3275727

Restart Required: Yes

Instructions:

1. Download and apply SAP Security Note 3275727. 2. Restart the SAP Host Agent service. 3. Verify the patch has been applied successfully.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the SAP Start Service port to only trusted hosts and networks.

Use firewall rules to restrict access to the SAP Start Service port (typically 5xx13 where xx is the instance number)

Service Port Change

all

Change the default port for SAP Start Service to a non-standard port.

Modify the SAP Start Service configuration to use a different port

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to SAP Start Service ports
  • Monitor network traffic to SAP Start Service ports for suspicious activity and implement intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check if SAP Host Agent version is 7.22 by running 'saphostctrl -version' or checking the installed version in SAP Management Console.

Check Version:

saphostctrl -version

Verify Fix Applied:

Verify that SAP Security Note 3275727 has been applied by checking the applied notes in SAP system or running version check commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual connection attempts to SAP Start Service port
  • Memory corruption errors in SAP Host Agent logs
  • Service restart events for SAP Host Agent

Network Indicators:

  • Unusual traffic patterns to SAP Start Service ports
  • Multiple connection attempts from single sources to SAP ports
  • Crafted request patterns to SAP services

SIEM Query:

source="sap_host_agent" AND (event_type="memory_error" OR event_type="service_crash")

🔗 References

📤 Share & Export