CVE-2024-45282

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to modify read-only fields in Bank Statement Drafts within SAP's Manage Bank Statements application using the OData MERGE method. This affects SAP systems with the vulnerable component where users can access the OData service. The integrity of financial data could be compromised.

💻 Affected Systems

Products:
  • SAP S/4HANA
  • SAP ERP
Versions: Multiple versions - see SAP Note 3251893 for specific affected versions
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Manage Bank Statements application and OData service enabled

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious actors could alter bank statement data, leading to financial discrepancies, incorrect reconciliations, or fraudulent transactions being processed.

🟠

Likely Case

Unauthorized modification of bank statement fields could cause data integrity issues requiring manual correction and investigation.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to minor data inconsistencies that can be detected and corrected.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to the OData service endpoint

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See SAP Note 3251893 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3251893

Restart Required: Yes

Instructions:

1. Review SAP Note 3251893. 2. Apply the relevant SAP Security Patch Day updates. 3. Restart affected SAP systems. 4. Verify the fix by testing read-only field behavior.

🔧 Temporary Workarounds

Restrict OData Service Access

all

Limit access to the vulnerable OData service endpoint to authorized users only

Configure SAP authorization roles to restrict access to /sap/opu/odata/sap/API_BANK_STATEMENT_DRAFT_SRV

Implement Input Validation

all

Add custom validation to reject MERGE requests attempting to modify read-only fields

Implement BAdI or enhancement to validate field modifications before processing

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access the Manage Bank Statements application
  • Enable detailed auditing and monitoring of all OData MERGE operations on bank statement drafts

🔍 How to Verify

Check if Vulnerable:

Test if read-only fields in Bank Statement Draft can be modified via OData MERGE requests to the vulnerable endpoint

Check Version:

Check SAP system version and applied patches via transaction SPAM or SNOTE

Verify Fix Applied:

After patching, verify that read-only fields reject modification attempts via OData MERGE method

📡 Detection & Monitoring

Log Indicators:

  • Unusual OData MERGE requests to bank statement endpoints
  • Multiple failed modification attempts on read-only fields

Network Indicators:

  • HTTP PATCH/MERGE requests to /sap/opu/odata/sap/API_BANK_STATEMENT_DRAFT_SRV with field modification attempts

SIEM Query:

source="sap_audit_log" AND (event="ODATA_MODIFY" OR event="FIELD_MODIFICATION") AND resource="BANK_STATEMENT_DRAFT" AND status="SUCCESS"

🔗 References

📤 Share & Export