CVE-2024-44117

5.4 MEDIUM

📋 TL;DR

This CVE allows low-privileged users in SAP systems to modify other users' favorite node URLs and workbook IDs through an RFC-enabled function module. It affects SAP applications with vulnerable RFC modules, primarily impacting data integrity with limited availability consequences.

💻 Affected Systems

Products:
  • SAP applications with vulnerable RFC function modules
Versions: Specific versions not detailed in CVE; check SAP Note 3488039
Operating Systems: All supported by SAP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged user access to the SAP system; impact depends on specific RFC module implementations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could redirect users to malicious sites through modified URLs, potentially leading to credential theft or malware installation, or disrupt business processes by altering workbook configurations.

🟠

Likely Case

Low-privileged users modifying colleagues' favorites to cause confusion or minor disruptions, or redirecting users to inappropriate/internal sites.

🟢

If Mitigated

With proper authorization controls and monitoring, impact is limited to minor configuration changes that can be quickly reverted.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated low-privileged access; specific function module details are in SAP Note 3488039.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See SAP Note 3488039 for specific patch information

Vendor Advisory: https://me.sap.com/notes/3488039

Restart Required: Yes

Instructions:

1. Review SAP Note 3488039. 2. Apply the relevant SAP Security Patch Day updates. 3. Restart affected SAP systems. 4. Verify the fix by testing the vulnerable function module.

🔧 Temporary Workarounds

Restrict RFC Function Module Access

all

Limit access to the vulnerable RFC function module using SAP authorization objects.

Use transaction SU24 to adjust authorization checks for the affected function module

Monitor RFC Calls

all

Implement monitoring for unauthorized modifications to user favorites and workbook IDs.

Configure SAP audit logging for relevant function modules and user table changes

🧯 If You Can't Patch

  • Implement strict authorization controls to limit which users can execute the vulnerable RFC function module.
  • Enable detailed logging and monitoring for modifications to user favorites and workbook configurations.

🔍 How to Verify

Check if Vulnerable:

Check if your SAP system has the vulnerable RFC function module enabled and accessible to low-privileged users.

Check Version:

Use SAP transaction SM51 or check system info for patch levels referenced in SAP Note 3488039.

Verify Fix Applied:

After patching, verify that low-privileged users can no longer modify other users' favorite nodes and workbook IDs through the RFC module.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized RFC calls to function modules modifying user favorites
  • Unexpected changes to user favorite URLs or workbook IDs

Network Indicators:

  • RFC traffic patterns showing unusual modifications to user configuration data

SIEM Query:

source="sap_audit_log" AND (event_type="RFC_CALL" AND function_module="[vulnerable_module]" AND user_privilege="LOW")

🔗 References

📤 Share & Export