CVE-2024-44115

4.3 MEDIUM

📋 TL;DR

This vulnerability in SAP's RFC-enabled function module allows low-privileged users to add URLs to any user's workplace favorites. This enables attackers to identify usernames and gather information about targeted users' workplaces and nodes. The impact on application integrity is low.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server ABAP
Versions: Multiple versions - see SAP Note 3488039 for specifics
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires RFC-enabled function module access; affects systems with workplace favorites functionality enabled

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map organizational structure, identify high-value targets, and potentially use gathered information for social engineering or targeted attacks.

🟠

Likely Case

Information disclosure about user accounts and workplace configurations, enabling reconnaissance for further attacks.

🟢

If Mitigated

Limited to low-privileged users accessing information they shouldn't, with minimal direct system compromise.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires low-privileged user account; exploitation is straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See SAP Note 3488039 for specific patch levels

Vendor Advisory: https://me.sap.com/notes/3488039

Restart Required: No

Instructions:

1. Apply SAP Security Note 3488039. 2. Follow SAP's standard patching procedures for your environment. 3. Verify the patch is correctly applied.

🔧 Temporary Workarounds

Restrict RFC function module access

all

Limit access to the vulnerable RFC function module to authorized users only

Use SAP transaction SE37 to adjust authorization for affected function module

Implement authorization checks

all

Add additional authorization checks in custom code that calls the vulnerable function

Review and modify ABAP code calling the function module

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized function module usage
  • Regularly audit user permissions and remove unnecessary RFC access

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3488039 is applied using transaction SNOTE

Check Version:

Use SAP transaction SM51 to check system information

Verify Fix Applied:

Verify SAP Note 3488039 implementation status and test that low-privileged users cannot modify other users' favorites

📡 Detection & Monitoring

Log Indicators:

  • Unusual RFC function module calls
  • Multiple favorites modifications for different users
  • Failed authorization checks for function module access

Network Indicators:

  • Unusual RFC traffic patterns
  • Multiple RFC calls from single low-privileged account

SIEM Query:

Search for event ID related to RFC function module access and authorization failures in SAP audit logs

🔗 References

📤 Share & Export