CVE-2024-39600
📋 TL;DR
CVE-2024-39600 is a memory disclosure vulnerability in SAP GUI for Windows where passwords remain in memory after login, potentially allowing attackers to extract credentials. This affects users of SAP GUI for Windows connecting to SAP systems. The vulnerability has high confidentiality impact but no integrity or availability impact.
💻 Affected Systems
- SAP GUI for Windows
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers with local access or memory dump capabilities could extract SAP passwords and gain unauthorized access to SAP systems, potentially leading to data theft or privilege escalation.
Likely Case
Malicious insiders or attackers with local access could extract passwords from memory, compromising individual user accounts on SAP systems.
If Mitigated
With proper access controls and monitoring, impact is limited to individual compromised accounts rather than system-wide compromise.
🎯 Exploit Status
Exploitation requires local access to the Windows system and ability to read process memory or obtain memory dumps.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check SAP Note 3461110 for specific patched versions
Vendor Advisory: https://me.sap.com/notes/3461110
Restart Required: Yes
Instructions:
1. Review SAP Note 3461110 for affected versions. 2. Apply the SAP GUI for Windows patch from SAP Support Portal. 3. Restart SAP GUI applications. 4. Verify patch installation.
🔧 Temporary Workarounds
Restrict Local Access
windowsLimit physical and remote access to systems running SAP GUI to trusted users only
Implement Credential Guard
windowsEnable Windows Credential Guard to protect credentials in memory
Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V -All
Enable-WindowsOptionalFeature -Online -FeatureName CredentialGuard
🧯 If You Can't Patch
- Implement strict access controls to limit who can access systems running SAP GUI
- Deploy endpoint security solutions that detect memory scraping attempts
🔍 How to Verify
Check if Vulnerable:
Check SAP GUI version against affected versions listed in SAP Note 3461110
Check Version:
In SAP GUI: Help → About SAP Logon or check program properties
Verify Fix Applied:
Verify SAP GUI version is updated to patched version specified in SAP Note 3461110
📡 Detection & Monitoring
Log Indicators:
- Unusual process memory access attempts
- Multiple failed login attempts followed by successful login from same system
Network Indicators:
- Unusual SAP GUI connections from unexpected locations
SIEM Query:
Process Creation where Image contains 'procdump' or 'mimikatz' AND Parent Process contains 'sap'