CVE-2023-36922
📋 TL;DR
This vulnerability allows authenticated attackers to execute arbitrary operating system commands on SAP ECC and S/4HANA systems with IS-OIL component. Successful exploitation enables attackers to read/modify system data or shut down the system. Only systems with IS-OIL component enabled are affected.
💻 Affected Systems
- SAP ECC
- SAP S/4HANA
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing data theft, modification, or destruction, and potential lateral movement to other systems.
Likely Case
Unauthorized data access, system configuration changes, or service disruption by authenticated malicious insiders.
If Mitigated
Limited impact with proper network segmentation, least privilege access, and command execution restrictions.
🎯 Exploit Status
Requires authenticated access but exploitation is straightforward once authenticated. OS command injection via unprotected parameter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply SAP Note 3350297
Vendor Advisory: https://me.sap.com/notes/3350297
Restart Required: Yes
Instructions:
1. Download SAP Note 3350297 from SAP Support Portal. 2. Apply the correction instructions in the note. 3. Restart affected SAP systems. 4. Verify the fix is applied.
🔧 Temporary Workarounds
Disable IS-OIL component
allRemove or disable the IS-OIL component if not required for business operations.
Transaction SPRO -> SAP Reference IMG -> Industry Solution Oil & Gas (IS-OIL) -> Deactivate
Implement input validation
allAdd parameter validation to block command injection attempts.
Implement ABAP code validation for the vulnerable function module parameters
🧯 If You Can't Patch
- Implement strict network segmentation to isolate SAP systems from critical infrastructure
- Apply principle of least privilege to limit authenticated user access to minimum required functions
🔍 How to Verify
Check if Vulnerable:
Check if IS-OIL component is active via transaction SPRO and verify if SAP Note 3350297 is applied.
Check Version:
Transaction SM51 or SM50 to check system details and applied notes
Verify Fix Applied:
Verify SAP Note 3350297 is applied in system and test the vulnerable function module with command injection attempts.
📡 Detection & Monitoring
Log Indicators:
- Unusual OS command execution in SAP logs
- Multiple failed authentication attempts followed by successful login and command execution
Network Indicators:
- Unusual outbound connections from SAP system to external IPs
- Command and control traffic patterns
SIEM Query:
source="sap*" AND ("command injection" OR "os command" OR "system call")