{"id":18243,"date":"2022-02-10T02:10:10","date_gmt":"2022-02-10T10:10:10","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/10\/news-11976\/"},"modified":"2022-02-10T02:10:10","modified_gmt":"2022-02-10T10:10:10","slug":"news-11976","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/10\/news-11976\/","title":{"rendered":"SAP customers are urged to patch critical vulnerabilities in multiple products"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 10 Feb 2022 08:58:36 +0000<\/strong><\/p>\n<p>German enterprise software maker SAP has patched three critical vulnerabilities affecting Internet Communication Manager (ICM), a core component of SAP business applications. Customers are urged by both <a href=\"https:\/\/blogs.sap.com\/2022\/02\/08\/sap-partners-with-onapsis-to-identify-and-patch-cybersecurity-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">SAP<\/a> and <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/02\/08\/critical-vulnerabilities-affecting-sap-applications-employing\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CISA<\/a> to address these critical vulnerabilities as soon as possible.<\/p>\n<p>On February 8, SAP released 14 new security notes and security researchers from Onapsis, in coordination with SAP, released a <a href=\"https:\/\/onapsis.com\/icmad-sap-cybersecurity-vulnerabilities\" rel=\"noreferrer noopener nofollow\" target=\"_blank\">Threat Report<\/a> describing SAP ICM critical vulnerabilities, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22536\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-22536<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22532\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-22532<\/a>, and <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22533\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-22533<\/a>. Onapsis also provides an <a href=\"https:\/\/github.com\/Onapsis\/onapsis_icmad_scanner\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">open source tool<\/a> to identify if a system is vulnerable and needs to be patched.<\/p>\n<h2>CVE-2022-22536<\/h2>\n<p>The most important vulnerability in this report is CVE-2022-22536, one of the ICMAD vulnerabilities. The ICMAD vulnerabilities are particularly critical because the issues exist by default in the SAP Internet Communication Manager (ICM). The ICM is one of the most important components of a SAP NetWeaver application server and is present in most SAP products. It is a critical part of the overall SAP technology stack, connecting SAP applications with the Internet.<\/p>\n<p>CVE-2022-22536 is a request smuggling and request concatenation in SAP NetWeaver, SAP Content Server and SAP Web Dispatcher. This vulnerability scored a <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\/\">CVSS<\/a> rating of 10 out of 10. The high score is easy to explain. A simple HTTP request, indistinguishable from any other valid message and without any kind of authentication, is enough for a successful exploitation of the vulnerability.<\/p>\n<h2>Other vulnerabilities<\/h2>\n<p>Some of the other \u201chigh scorers\u201d are <a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2021\/12\/log4j-zero-day-log4shell-arrives-just-in-time-to-ruin-your-weekend\/\">Log4j<\/a> related vulnerabilities, and a security update for the browser control Google Chromium delivered with SAP Business Client. The other two ICMAD vulnerabilities identified as CVE-2022-22532 and CVE-2022-22533 received scores of 8.1 and 7.5, respectively.<\/p>\n<h2>Scan tool<\/h2>\n<p>On <a href=\"https:\/\/github.com\/Onapsis\/onapsis_icmad_scanner\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GitHub<\/a> Onapsis published a Python script that can be used to check if a SAP system is affected by CVE-2022-22536.<\/p>\n<p>A <a href=\"https:\/\/www.shodan.io\/search?query=server%3A+SAP+NetWeaver+Application+Server\" rel=\"noreferrer noopener nofollow\" target=\"_blank\">Shodan scan<\/a> shows there are more than 5,000 SAP NetWeaver servers currently connected to the Internet and exposed to attacks until the patch is applied.<\/p>\n<h2>Mitigation<\/h2>\n<p>SAP and Onapsis are currently unaware of any customer breaches that relate to these vulnerabilities, but strongly advise impacted organizations to immediately apply Security Note 3123396 (which covers CVE-2022-22536) to their affected SAP applications as soon as possible.<\/p>\n<p>The Cybersecurity &amp; Infrastructure Security Agency (CISA) warned that customers who fail to do so will be exposing themselves to ransomware attacks, the theft of sensitive data, financial fraud, and disruption or halt of business operations.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/sap-customers-are-urged-to-patch-critical-vulnerabilities-in-multiple-products\/\">SAP customers are urged to patch critical vulnerabilities in multiple products<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/sap-customers-are-urged-to-patch-critical-vulnerabilities-in-multiple-products\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 10 Feb 2022 08:58:36 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/sap-customers-are-urged-to-patch-critical-vulnerabilities-in-multiple-products\/' title='SAP customers are urged to patch critical vulnerabilities in multiple products'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2021\/04\/sap.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>SAP customers are advised to urgently apply the February patches issued by the German software maker. The patch addresses a vulnerability in multiple SAP products that is easy to exploit.<\/p>\n<p>Categories: <a href=\"https:\/\/blog.malwarebytes.com\/category\/exploits-and-vulnerabilities\/\" rel=\"category tag\">Exploits and vulnerabilities<\/a><\/p>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2022-22356\/\" rel=\"tag\">cve-2022-22356<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cvss\/\" rel=\"tag\">CVSS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/icm\/\" rel=\"tag\">icm<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/icmad\/\" rel=\"tag\">icmad<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/netweaver\/\" rel=\"tag\">NetWeaver<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/onapsis\/\" rel=\"tag\">Onapsis<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sap\/\" rel=\"tag\">sap<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/sap-customers-are-urged-to-patch-critical-vulnerabilities-in-multiple-products\/' title='SAP customers are urged to patch critical vulnerabilities in multiple products'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/sap-customers-are-urged-to-patch-critical-vulnerabilities-in-multiple-products\/\">SAP customers are urged to patch critical vulnerabilities in multiple products<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[24923,24784,22783,24924,24925,24926,24927,21748],"class_list":["post-18243","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2022-22356","tag-cvss","tag-exploits-and-vulnerabilities","tag-icm","tag-icmad","tag-netweaver","tag-onapsis","tag-sap"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18243"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18243\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}