CVE-2023-27893

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated non-administrative users in SAP Solution Manager and ABAP managed systems to exploit a vulnerable interface to execute unauthorized application functions. Attackers can read or modify any user/application data and potentially cause application unavailability. Affects specific versions of SAP ST-PI systems.

💻 Affected Systems

Products:
  • SAP Solution Manager
  • SAP ABAP managed systems (ST-PI)
Versions: 2088_1_700, 2008_1_710, 740
Operating Systems: Any OS running affected SAP versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with common remote execution authorization; affects ST-PI component specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of application data integrity and confidentiality, potential system-wide data manipulation or deletion, and denial of service making critical business applications unavailable.

🟠

Likely Case

Unauthorized data access and modification by authenticated users exploiting their legitimate access to perform privilege escalation attacks against the SAP system.

🟢

If Mitigated

Limited to authenticated users only, with proper network segmentation and monitoring potentially detecting anomalous function execution patterns.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of vulnerable interface; SAP has not disclosed technical details publicly.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3296476

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3296476

Restart Required: Yes

Instructions:

1. Download SAP Security Note 3296476 from SAP Support Portal. 2. Apply the note to affected systems. 3. Restart affected SAP services. 4. Verify patch application through transaction SNOTE.

🔧 Temporary Workarounds

Restrict User Privileges

all

Temporarily remove or restrict common remote execution authorizations from non-administrative users until patching can be completed.

Use SAP transaction SU01 to modify user authorizations

Network Segmentation

all

Isolate affected SAP systems from general network access and restrict to necessary administrative connections only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to SAP systems only from trusted administrative networks.
  • Enable detailed logging and monitoring of user function executions and implement alerts for anomalous activity patterns.

🔍 How to Verify

Check if Vulnerable:

Check SAP system version and installed notes via transaction SM51 and SNOTE; verify if Security Note 3296476 is missing.

Check Version:

Transaction SM51 or SM50 to check SAP kernel and system version

Verify Fix Applied:

Verify Security Note 3296476 is applied and active in transaction SNOTE; test with authorized user attempting to execute functions beyond their role.

📡 Detection & Monitoring

Log Indicators:

  • Unusual function module executions by non-admin users
  • Authorization failures followed by successful executions
  • Patterns of users accessing interfaces beyond their typical roles

Network Indicators:

  • Unusual volume of RFC calls from non-administrative systems
  • Anomalous traffic patterns to ST-PI interfaces

SIEM Query:

source="sap_audit_log" AND (event_type="authorization_check" AND result="success" AND user_role="non_admin")

🔗 References

📤 Share & Export