The global and independent platform for the SAP community.

Security gaps in 95 percent of all SAP systems

A study has identified the most commonly used attack methods on SAP systems. A large proportion of the SAP systems examined have vulnerabilities that allow hackers to gain access to sensitive information and disrupt business-critical corporate processes.
E-3 Magazine
June 22, 2015
2015
avatar
This text has been automatically translated from German to English.

SAP security specialist Onapsis has identified the three most common approaches to cyberattacks on SAP applications. These attack vectors put intellectual property, financial, credit card, customer and supplier data, and information stored in databases of the world's largest companies at high risk.

For their study, Onapsis Research Labs examined hundreds of SAP installations. Ninety-five percent of these SAP systems had vulnerabilities that allowed hackers to gain complete access to the business data and processes of the affected companies.

18 months until a patch is implemented

In addition, researchers found that most organizations take 18 months or longer to implement patches for vulnerabilities they find.

In 2014 alone, SAP released 391 security patches - an average of more than 30 per month! Almost 50 percent of these patches were given a high priority by SAP.

Who is responsible?

"The topic of SAP cyber security is not pursued seriously enough by many companies because it is not clear who is responsible for it - the SAP operations team or the IT security team. This really surprised us"

says Mariano Nunez, CEO and founder of Onapsis.

Most of the patches applied are not security-relevant, come late or open new vulnerabilities for the operation of the SAP system. Every day, new data leaks become known without Chief Information Security Officers (CISOs) knowing about them - because they lack visibility into their SAP applications.

The three most common SAP attacks

  1. Customer and credit card information threats that exploit exchanges between SAP systems: The attacks start at a system with low security settings and shimmy their way to a business-critical system by executing remotely controllable function modules in the target system.
  2. Attacks on customer and supplier portals: This involves creating backdoor users in the SAP J2EE user management module. By exploiting a vulnerability, the hackers can gain access to SAP portals and process integration platforms as well as related internal systems.
  3. Attacks on databases via proprietary SAP protocols: For this attack, operating system commands are executed with the rights of specific users and vulnerabilities in the SAP RFC gateway are exploited. The hacker gains access to any information stored in the SAP database and can modify it.

Conclusion

"The Hana real-time database actually makes the situation worse. The number of new security patches specifically affecting this new platform has increased by 450 percent.

In addition, Hana is placed at the center of the SAP ecosystem as a core component. Data stored in SAP platforms now needs to be protected both in the cloud and in the enterprise," Nunez elaborates.

 


 

Action Plan for Chief Information Security Officers (CISO)

Companies that run business-critical processes through Business Suite solutions should be sure to follow the latest SAP security guidance. They should also ensure that their systems are properly configured to meet applicable compliance requirements and increase security levels. These activities should follow an action plan that establishes SAP cyber security as part of the corporate strategy and roadmap:

  • Implement visibility in SAP-based components to identify values at risk.
  • Take precautions against security and compliance issues through continuous monitoring.
  • Identify new threats, attacks and anomalous user behavior as Indicators of Compromise (IOC) and respond with appropriate measures.
avatar
E-3 Magazine

Information and educational outreach by and for the SAP community.


Write a comment

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the second time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork.

Venue

FourSide Hotel Salzburg,
Trademark Collection by Wyndham
Am Messezentrum 2, 5020 Salzburg, Austria
+43-66-24355460

Event date

Wednesday, May 21, and
Thursday, May 22, 2025

Regular ticket

EUR 590 excl. VAT

Informationen Teilnehmer:

Die nachfolgende Abfrage zur Altersgruppe dient rein statistischen Zwecken. Wir bitten Sie freundlicherweise um eine freiwillige Angabe.


Rechnungsadresse:

Falls Sie hier Ihre E-Mailadresse angeben, wird Ihre Rechnung ausschließlich per E-Mail nach Veranstaltung an die angegebene Adresse gesendet.

Laut Steuergesetz müssen Firmenbezeichnungen in Rechnungen korrekt sein. Ihre eingegebenen Daten werden zur Rechnungsstellung übernommen.

Venue

Hotel Hilton Heidelberg
Kurfürstenanlage 1
D-69115 Heidelberg

Event date

Wednesday, April 22 and
Thursday, April 23, 2026

Tickets

Regular ticket
EUR 590 excl. VAT
Early Bird Ticket
available until 1.10.2025
EUR 390 excl. VAT
The event is organized by the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes attendance at all presentations of the Steampunk and BTP Summit 2026, a visit to the exhibition area, participation in the evening event and catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due course.

Informationen Teilnehmer:

Die nachfolgende Abfrage zur Altersgruppe dient rein statistischen Zwecken. Wir bitten Sie freundlicherweise um eine freiwillige Angabe.


Rechnungsadresse:

Falls Sie hier Ihre E-Mailadresse angeben, wird Ihre Rechnung ausschließlich per E-Mail nach Veranstaltung an die angegebene Adresse gesendet.

Laut Steuergesetz müssen Firmenbezeichnungen in Rechnungen korrekt sein. Ihre eingegebenen Daten werden zur Rechnungsstellung übernommen.