CVE-2023-37483

9.8 CRITICAL

📋 TL;DR

SAP PowerDesigner 16.7 has an improper access control vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries against the back-end database via Proxy. This affects organizations using SAP PowerDesigner 16.7 for database modeling and design.

💻 Affected Systems

Products:
  • SAP PowerDesigner
Versions: 16.7
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects PowerDesigner installations with proxy functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, modification, deletion, or potential remote code execution on the database server.

🟠

Likely Case

Unauthorized data access, extraction of sensitive database information, and potential data manipulation.

🟢

If Mitigated

Limited impact with proper network segmentation and database access controls in place.

🌐 Internet-Facing: HIGH - Direct database access via unauthenticated proxy allows full database manipulation.
🏢 Internal Only: HIGH - Even internally, unauthenticated access to database queries poses significant risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Direct SQL query execution via proxy without authentication makes exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3341460

Vendor Advisory: https://me.sap.com/notes/3341460

Restart Required: Yes

Instructions:

1. Download patch from SAP Note 3341460. 2. Apply to PowerDesigner installation. 3. Restart PowerDesigner services. 4. Verify proxy access controls are properly configured.

🔧 Temporary Workarounds

Disable Proxy Functionality

all

Disable or restrict proxy access to PowerDesigner if not required.

Configure PowerDesigner settings to disable proxy functionality

Network Segmentation

all

Restrict network access to PowerDesigner instances.

Configure firewall rules to limit access to PowerDesigner ports

🧯 If You Can't Patch

  • Implement strict network access controls to isolate PowerDesigner instances
  • Monitor database queries and proxy access logs for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check PowerDesigner version and verify if SAP Note 3341460 is applied.

Check Version:

Check PowerDesigner About dialog or installation directory version files

Verify Fix Applied:

Verify patch installation and test proxy access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database query patterns via proxy
  • Unauthenticated access attempts to proxy endpoints

Network Indicators:

  • Unexpected SQL queries from PowerDesigner proxy ports
  • Database connection spikes from PowerDesigner

SIEM Query:

source="PowerDesigner" AND (event_type="proxy_access" OR event_type="database_query") AND user="anonymous"

🔗 References

📤 Share & Export