CVE-2024-39600

5.0 MEDIUM

📋 TL;DR

CVE-2024-39600 is a memory disclosure vulnerability in SAP GUI for Windows where passwords remain in memory after login, potentially allowing attackers to extract credentials. This affects users of SAP GUI for Windows connecting to SAP systems. The vulnerability has high confidentiality impact but no integrity or availability impact.

💻 Affected Systems

Products:
  • SAP GUI for Windows
Versions: Multiple versions - check SAP Note 3461110 for specific affected versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects SAP GUI for Windows client installations, not SAP server components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with local access or memory dump capabilities could extract SAP passwords and gain unauthorized access to SAP systems, potentially leading to data theft or privilege escalation.

🟠

Likely Case

Malicious insiders or attackers with local access could extract passwords from memory, compromising individual user accounts on SAP systems.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to individual compromised accounts rather than system-wide compromise.

🌐 Internet-Facing: LOW - This requires local access to the Windows system running SAP GUI.
🏢 Internal Only: HIGH - Internal attackers or malware with local access could exploit this to steal SAP credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the Windows system and ability to read process memory or obtain memory dumps.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3461110 for specific patched versions

Vendor Advisory: https://me.sap.com/notes/3461110

Restart Required: Yes

Instructions:

1. Review SAP Note 3461110 for affected versions. 2. Apply the SAP GUI for Windows patch from SAP Support Portal. 3. Restart SAP GUI applications. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit physical and remote access to systems running SAP GUI to trusted users only

Implement Credential Guard

windows

Enable Windows Credential Guard to protect credentials in memory

Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V -All
Enable-WindowsOptionalFeature -Online -FeatureName CredentialGuard

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access systems running SAP GUI
  • Deploy endpoint security solutions that detect memory scraping attempts

🔍 How to Verify

Check if Vulnerable:

Check SAP GUI version against affected versions listed in SAP Note 3461110

Check Version:

In SAP GUI: Help → About SAP Logon or check program properties

Verify Fix Applied:

Verify SAP GUI version is updated to patched version specified in SAP Note 3461110

📡 Detection & Monitoring

Log Indicators:

  • Unusual process memory access attempts
  • Multiple failed login attempts followed by successful login from same system

Network Indicators:

  • Unusual SAP GUI connections from unexpected locations

SIEM Query:

Process Creation where Image contains 'procdump' or 'mimikatz' AND Parent Process contains 'sap'

🔗 References

📤 Share & Export