CVE-2023-49580

7.3 HIGH

📋 TL;DR

This vulnerability in SAP GUI for Windows and Java allows unauthenticated attackers to access restricted information and create ABAP List Viewer layout configurations, potentially increasing response times. It affects SAP_BASIS versions 755-758. Systems with exposed SAP GUI interfaces are vulnerable.

💻 Affected Systems

Products:
  • SAP GUI for Windows
  • SAP GUI for Java
Versions: SAP_BASIS 755, 756, 757, 758
Operating Systems: Windows, Linux, macOS (for Java GUI)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Windows and Java versions of SAP GUI. Requires SAP GUI to be accessible to attackers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers access confidential business data, manipulate system configurations, and degrade performance through denial-of-service conditions.

🟠

Likely Case

Information disclosure of sensitive SAP data and performance degradation through configuration manipulation.

🟢

If Mitigated

Limited impact if systems are properly segmented and access controls prevent unauthenticated connections.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation means exposed systems are immediately vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but network segmentation reduces exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated access makes exploitation straightforward if vulnerable systems are reachable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3385711

Vendor Advisory: https://me.sap.com/notes/3385711

Restart Required: Yes

Instructions:

1. Download and apply SAP Note 3385711 patch. 2. Restart affected SAP GUI instances. 3. Verify patch application through version checks.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SAP GUI interfaces to trusted networks only.

Access Control Lists

all

Implement firewall rules to block unauthenticated access to SAP GUI ports.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP GUI from untrusted networks.
  • Monitor for unusual access patterns and configuration changes in ABAP List Viewer.

🔍 How to Verify

Check if Vulnerable:

Check SAP_BASIS version in SAP GUI or system administration tools. Versions 755-758 are vulnerable.

Check Version:

In SAP GUI: System → Status → check SAP_BASIS component version

Verify Fix Applied:

Verify SAP Note 3385711 is applied and SAP_BASIS version is updated beyond affected range.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to SAP GUI
  • Unexpected ABAP List Viewer configuration changes
  • Increased response times in SAP transactions

Network Indicators:

  • Unusual traffic to SAP GUI ports from untrusted sources
  • Multiple failed authentication attempts followed by configuration changes

SIEM Query:

source="sap_gui" AND (event_type="unauthorized_access" OR event_type="configuration_change")

🔗 References

📤 Share & Export