CVE-2024-22131

9.1 CRITICAL

📋 TL;DR

This vulnerability in SAP ABA allows authenticated users with remote execution authorization to exploit a vulnerable interface, enabling them to invoke application functions beyond their normal permissions. This can lead to unauthorized data access, modification, or system disruption. Affects multiple SAP ABA versions from 700 to 75I.

💻 Affected Systems

Products:
  • SAP ABA (Application Basis)
Versions: 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I
Operating Systems: All platforms running affected SAP versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have remote execution authorization; affects all deployments with vulnerable versions regardless of OS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise: attacker can read/modify all business data, execute arbitrary code, and cause permanent system unavailability.

🟠

Likely Case

Privilege escalation leading to unauthorized data access and business logic manipulation by authenticated malicious insiders or compromised accounts.

🟢

If Mitigated

Limited impact if proper authentication controls, least privilege principles, and network segmentation are enforced.

🌐 Internet-Facing: HIGH if SAP systems are exposed to internet and authentication is bypassed or compromised.
🏢 Internal Only: HIGH due to potential for insider threats and lateral movement within corporate networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with specific authorization; interface abuse is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3420923

Vendor Advisory: https://me.sap.com/notes/3420923

Restart Required: Yes

Instructions:

1. Download SAP Note 3420923 from SAP Support Portal. 2. Apply the correction instructions provided in the note. 3. Restart affected SAP systems. 4. Verify patch application through transaction SNOTE.

🔧 Temporary Workarounds

Restrict Remote Execution Authorization

all

Tightly control and audit user accounts with remote execution privileges to minimize attack surface.

Review and adjust authorization profiles via transaction PFCG
Use transaction SUIM to audit users with S_RFC authorization

Network Segmentation

all

Isolate SAP systems from untrusted networks and implement strict firewall rules.

Configure firewall to restrict SAP RFC ports (default 33xx, 48xx) to trusted IPs only

🧯 If You Can't Patch

  • Implement strict access controls: review and minimize users with remote execution authorization.
  • Enable comprehensive logging and monitoring for suspicious RFC calls and authorization changes.

🔍 How to Verify

Check if Vulnerable:

Check SAP system version via transaction SM51 or system info; if version is 700-75I and SAP Note 3420923 is not applied, system is vulnerable.

Check Version:

Execute transaction SM51 or run 'disp+work' in SAP GUI to view system version.

Verify Fix Applied:

Verify SAP Note 3420923 is applied using transaction SNOTE or check system info for patch level.

📡 Detection & Monitoring

Log Indicators:

  • Unusual RFC calls from unauthorized users
  • Authorization changes for remote execution profiles
  • Failed authorization checks for sensitive functions

Network Indicators:

  • Anomalous traffic on SAP RFC ports (33xx, 48xx) from unexpected sources
  • Multiple failed authentication attempts followed by successful RFC connections

SIEM Query:

source="sap_audit_log" AND (event_id="RFC_CALL" OR event_id="AUTHORIZATION_CHECK") AND result="SUCCESS" AND user NOT IN [authorized_users_list]

🔗 References

📤 Share & Export