CVE-2023-36921

7.2 HIGH

📋 TL;DR

This vulnerability in SAP Solution Manager's Diagnostics agent allows attackers to tamper with request headers, potentially poisoning content served to the server. It affects SAP Solution Manager version 7.20, leading to limited impacts on confidentiality and availability.

💻 Affected Systems

Products:
  • SAP Solution Manager (Diagnostics agent)
Versions: Version 7.20
Operating Systems: Not specified, likely cross-platform as it's SAP software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Diagnostics agent component; specific configurations may vary.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could serve malicious content to the server, causing data leakage or service disruption.

🟠

Likely Case

Limited data exposure or temporary availability issues due to header manipulation.

🟢

If Mitigated

Minimal impact if patched or with network segmentation and monitoring.

🌐 Internet-Facing: MEDIUM, as exploitation requires access to the agent, which may be exposed in some configurations.
🏢 Internal Only: MEDIUM, as internal attackers could exploit it if they have network access to the agent.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires tampering with headers, which may involve network access and specific knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3348145 for fixes.

Vendor Advisory: https://me.sap.com/notes/3348145

Restart Required: Yes

Instructions:

1. Access SAP Note 3348145 via the provided URL. 2. Follow SAP's instructions to apply the patch. 3. Restart the Diagnostics agent service as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to the Diagnostics agent to trusted networks only.

Use firewall rules to limit inbound connections to the agent's port.

🧯 If You Can't Patch

  • Implement strict network access controls to isolate the Diagnostics agent.
  • Monitor logs for unusual header manipulation attempts and review SAP security advisories regularly.

🔍 How to Verify

Check if Vulnerable:

Check if SAP Solution Manager version is 7.20 and the Diagnostics agent is running without patch from SAP Note 3348145.

Check Version:

Use SAP transaction code SM51 or check system info in SAP GUI for version details.

Verify Fix Applied:

Verify that SAP Note 3348145 has been applied and the agent version is updated per SAP's documentation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual header patterns or errors in SAP Diagnostics agent logs.

Network Indicators:

  • Suspicious traffic to the Diagnostics agent port with manipulated headers.

SIEM Query:

Search for events from SAP Solution Manager with error codes related to header processing or agent failures.

🔗 References

📤 Share & Export