May 11, 2015 By Douglas Bonderud 2 min read

According to security research firm Onapsis, any enterprise running back-end SAP systems has a problem. New data suggests that over 95 percent of SAP installations studied had been exposed to “vulnerabilities that could lead to the full compromise of an organization’s business data and processes.” With more than 250,000 customers worldwide — including 87 Global 2000 companies — these systems are ubiquitous. The result? These new SAP vulnerabilities have created a sticky situation for IT security.

The Bigger They Are, the Broader the Threat

Onapsis identified three unique ways that attackers are trying to breach SAP systems, starting with pivot attacks. Here, hackers move quickly between multiple back-end systems of varying integrity levels, hoping to glean bits and pieces of customer information, including credit card data. The second attack vector uses customer and supplier portal attacks, which are possible thanks to the creation of backdoor users in the SAP J2EE User Management Engine. The third threat comes from direct attacks through SAP protocols using the SAP RFC gateway to obtain and modify stored data. Together, these three methods give malicious actors a wealth of choices.

These aren’t the only SAP vulnerabilities brought to light in recent months. In February, for example, vulnerabilities were discovered in BusinessObjects, which allowed hackers to obtain unauthenticated access and remotely retrieve, alter and delete business data without being detected, Dark Reading reported. In addition, a cross-site scripting flaw in SAP’s HANA database platform made it possible for hackers to potentially grab authentication data from any user on the system.

The sheer scope of SAP deployments makes some vulnerabilities inevitable, but Onapsis’ data suggests a more widespread issue. What’s really behind the steady flow of new flaws?

Operations Gaps Lead to SAP Vulnerabilities

According to IT World Canada, part of the problem stems from a gap between CISOs, their security teams and SAP operations teams, which may result from a lack of knowledge about SAP. “SAP systems are inherently complex by nature as they are the backbone of business systems and the processes that run the enterprise,” Onapsis’ CTO and Head of Research Juan Pablo Perez-Etchegoyen explained to Dark Reading. Cybersecurity measures are typically aimed at processes, people and infrastructure, while SAP is left out of the loop. As a result, it’s the perfect way in for attackers. What’s more, these back-end systems are often so complex that CISOs and their teams may not even know they’re under attack until it’s too late.

The SAP gap also stems from problems with patches. While the average patch window at most companies is 18 months or longer, SAP releases up to 30 patches per month, with more than half labeled as “high priority.” But Onapsis CEO Mariano Nunez said “the truth is that most patches applied are not security-related, are late or introduce further operational risk.” In other words, just being late to the party isn’t enough since some patches do nothing to increase security, while others may make the problem worse.

C-suites need to identify key information security baselines and design SAP security plans that don’t compromise safety for the benefit of speed or uptime. Applying security patches on a regular basis is also critical, but above all, enterprises need better visibility into their SAP deployments. Even small security holes make a difference, and if there are too many, the IT tree comes crashing down.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today