CVE-2024-47586

5.3 MEDIUM

📋 TL;DR

CVE-2024-47586 is a null pointer dereference vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform that allows unauthenticated attackers to crash the system via a malicious HTTP request. This causes temporary denial of service through system reboots, affecting availability only. All organizations running vulnerable SAP ABAP systems are affected.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server for ABAP
  • SAP ABAP Platform
Versions: Multiple versions - see SAP Note 3504390 for specific affected releases
Operating Systems: All supported SAP operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations are vulnerable; no special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system outage causing extended downtime and service disruption until manual intervention restores the system.

🟠

Likely Case

Intermittent system crashes and reboots leading to service interruptions and potential data loss from incomplete transactions.

🟢

If Mitigated

Minimal impact with proper network segmentation and web application firewalls blocking malicious requests.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation via HTTP makes internet-facing systems particularly vulnerable to DoS attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still cause service disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request construction makes exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3504390

Vendor Advisory: https://me.sap.com/notes/3504390

Restart Required: Yes

Instructions:

1. Download SAP Note 3504390 from SAP Support Portal. 2. Apply the kernel patch using SAP standard patching procedures. 3. Restart the affected SAP instances. 4. Verify patch application through system logs.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to SAP HTTP services to trusted networks only

Web Application Firewall

all

Deploy WAF with SAP-specific rules to filter malicious HTTP requests

🧯 If You Can't Patch

  • Implement strict network access controls to limit HTTP access to SAP systems
  • Deploy intrusion prevention systems with SAP-specific signatures to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if SAP kernel version is affected by comparing against patched versions in SAP Note 3504390

Check Version:

Execute 'disp+work' command in SAP system or check kernel version in transaction SM51

Verify Fix Applied:

Verify SAP Note 3504390 is applied using transaction SNOTE and check system logs for successful patch application

📡 Detection & Monitoring

Log Indicators:

  • System crash dumps
  • Kernel panic messages
  • Unexpected system restarts in SAP logs

Network Indicators:

  • Malformed HTTP requests to SAP HTTP ports
  • Unusual traffic patterns to SAP services

SIEM Query:

source="sap_system_logs" AND ("kernel panic" OR "system crash" OR "unexpected restart")

🔗 References

📤 Share & Export