CVE-2024-42371

5.4 MEDIUM

📋 TL;DR

This CVE allows low-privileged users to delete workplace favorites of any user in SAP systems, potentially exposing usernames and workplace/node information. It affects SAP systems with the vulnerable RFC-enabled function module. The impact is primarily on confidentiality with low integrity/availability effects.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server ABAP
Versions: Multiple SAP NetWeaver versions (specific versions in SAP Note 3488039)
Operating Systems: All supported SAP OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires RFC-enabled function module access; specific component details in SAP security note

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map organizational structure, identify high-value targets, and gather reconnaissance data for further attacks by analyzing workplace favorites patterns.

🟠

Likely Case

Low-privileged users deleting colleagues' workplace favorites, causing minor productivity disruption and exposing some user information.

🟢

If Mitigated

Limited to authorized users with legitimate business needs for the function module, with proper logging and monitoring in place.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires low-privileged SAP user credentials; exploitation is straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See SAP Note 3488039 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3488039

Restart Required: No

Instructions:

1. Apply SAP Security Note 3488039 via SAP Note Assistant. 2. Implement the correction instructions. 3. Verify the fix in development before production deployment.

🔧 Temporary Workarounds

Restrict RFC Function Module Access

all

Limit access to the vulnerable RFC-enabled function module using SAP authorization objects

Use transaction SU24 to maintain authorization objects for the affected function module

Implement User Activity Monitoring

all

Monitor and alert on suspicious deletion of workplace favorites

Configure SAP Security Audit Log (SM19) to log relevant activities

🧯 If You Can't Patch

  • Implement strict authorization controls to limit access to the vulnerable function module
  • Enable detailed logging and monitoring for workplace favorites deletion activities

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3488039 is applied using transaction SNOTE or check component versions against affected list in the note

Check Version:

Use transaction SM51 to check SAP kernel and component versions

Verify Fix Applied:

Verify SAP Note 3488039 implementation status and test that low-privileged users cannot delete other users' workplace favorites

📡 Detection & Monitoring

Log Indicators:

  • Multiple workplace favorites deletion events from single user
  • Cross-user favorites deletion patterns
  • Unusual RFC function module calls

Network Indicators:

  • Unusual RFC traffic patterns to the vulnerable function module

SIEM Query:

source="sap_audit_log" AND (event="workplace_favorites_delete" OR function_module="[vulnerable_module]")

🔗 References

📤 Share & Export