The global and independent platform for the SAP community.

Target SAP

SAP-controlled business processes and data are an attractive target for attackers. External as well as internal attackers who hijack foreign credentials or extend authorizations can access data and applications via the transaction layers of incorrectly or riskily configured SAP systems.
Mariano Nunez, Onapsis
November 25, 2016
Attack and defense
avatar
This text has been automatically translated from German to English.

Unauthorized access enables sabotage, espionage and fraud - up to full control over SAP infrastructures.

Due to unauthorized Accesses at Databases spies gain insight into all of a company's critical data: USIS, a provider of background research on personal data, was forced to admit in 2015 to unauthorized external access to at least 25,000 employees' data in U.S. government agencies.

For a fraud extends a Attacker his Right in SAP systems, creates itself as a fake supplier, writes itself an invoice and initiates the transfer to its own account.

This is done by extending the privileges of a user-Accounts - by leveraging the SAP-specific security approach of Segregation of Duties (SoD): While a separation of duties or competencies can be effective for Security provide by Right of employees in development, production, planning and accounting are neatly separated.

Mariano NunezHowever, the separation can also be achieved by strongly privileged Accounts be leveraged.

In a case warned about in May 2016 by the government-affiliated US-CERT, a patch that has actually been closing since 2010 is being Security gap still exploited in SAP systems with Invoker Servlet enabled.

Through the gap can Attacker remotely access new SAPUser with administrative privileges via the web browser.

The gap could be identified at 36 companies - 13 of which generated annual sales of more than ten billion euros.

The attack targeted non-updated or misconfigured SAP Java platforms. Sabotage by shutting down SAP applications or even an entire system is also dramatic.

The damage when an application must be taken offline was estimated by respondents to a Ponemon Institute study in spring 2016 at $4.5 million - including all costs to repair the damage and lost business opportunities.

Attacks on profiles and privileges

The target areas for attacks on access rights and user profiles are the transaction layers - such as Hana or NetWeaver - which manage business information and processes as well as access to them, regulate communication between the instances, and are responsible for their Security for instance by Encryption provide.

Also Accounts and their permissions are managed in the transaction layer with parameters and can be configured like in a Database Change. Attacker try to use these accesses to remotely control data traffic, read, copy, move or overwrite directories of any content.

All parameters of SAP infrastructures can be configured quickly by entering numerical values.

Account-Management and error rate

The most diverse possibilities of AccountManagement quickly create complexity and increase the error rate.

Risks arise from the customizing of the SAP software, from the settings made by the user Management Engine (UME) in Java systems, which is responsible for searching or creating new users, and by the Access Control List (ACL), which regulates the logon to servers and the admission of programs or connections (reginfo, secinfo, Webdispatcher, Management Console, Message Server, ICM).

Further dangers exist in the configuration of user roles and user parameters in general (for example, through the universally authorized Sap_All user and user profiles that can accept RFC connections) or in the case of insecure configurations of authentication procedures.

Management from Risk-Applicants

Extensive privileges make users dangerous. However, if credentials have been leaked or authentication procedures have been circumvented, the use of secure user types can still provide a second wall of protection.

A basic rule in rights management is therefore to create a User only with the minimum Right which he needs for his task. The so-called restricted user, who has no special privileges in the default setting, on Databases only accesses via client applications and does not have full SQL access should be security standard.

Standard users who can create their own objects by default, read data in the system view and have a public role should be avoided if possible. Their log-in, data query and data transfer activities must be monitored in particular.

Of course, this also applies to particularly critical Hana-User: The adm user (where stands for the respective Hana-system SID), which is created during the installation process at the operating system level, unprotected represents a Risk represents. It has privileges for all Hana-System Resources.

Many system providers place the Password for this User during the installation of the systems at customers' sites. It should be changed at the latest after handover of the SAP infrastructure.

Also other User on operating system environment, such as the root user, the sapadm user or individually created user profiles, must be configured securely and monitored all the more closely with extensive privileges.

Side entrances

Another backdoor to be monitored, which is often not asked for credentials when entering, are SAP's emergency mechanisms. With the profile parameter login/no_automatic_user_sapstar, an access for uncomplicated problem solving is available, which leads to the dangerous Backdoor can be.

If the super user SAP* is then deleted, this access no longer exists for the auditable Databases. Therefore, it remains undetected when performing conventional audits, but has a connection to the system with all authorizations. In addition, the standardPassword not be changed.Hazard table

The result of misuse is the compromise of either one or more clients, one or more application servers, or even the entire SAP system.

The simple workaround is to never delete the super user, additionally save the user SAP* and set the value login/no_automatic_user_sapstar with "1".

However, insecure configurations of authentication procedures also pose a high Risk present. Danger create scripts for automatic saving of Passwords in the SAP GUI user interface. If set appropriately, these save the values entered in the log-in field, for example, and thus also Passwords - but also user data from customers.

Such attacks are favoured by an excessively weak Encryption when saving the data. In addition, the history of entries in user name fields for each User saved in a uniformly named file, so that a Hacker find them easily. For more Security provides the Protection of entries in darkened input fields or turning off the saving of past entries.

Another gap are the so-called SAP shortcuts. Here define User not only a target address for logging in to an SAP instance, the transaction to be triggered there, and possibly the entry of a default user name.

A shortcut defined or controlled by the wrong hands can become a gateway to systems. In earlier transaction layers, the danger was even greater because the shortcuts also included the automatic input of individual Passwords could be installed.

SAP has made these options available for new Passwords therefore blocked in the meantime. For already existing Passwords this danger may still exist.

Configuration check and attack defense

Given the complexity and dimension of configuration issues, errors are almost impossible to avoid. But it is important to find and fix them as quickly as possible.

An effective SAP security solution therefore investigates configuration errors and provides near real-time protection against possible attacks.

The inventory of Security gaps can only be achieved through automated assessment solutions. It is important to continuously check the security status of the SAP infrastructure in order to immediately detect any new misconfigurations. SAP Security

In the process, not only productive systems, but also Test-systems must be taken into account, because it is precisely here that default configured and often forgotten user-Accounts, which are exploited by unwanted visitors.

Configurations from Accounts or authentication solutions can be configured according to different guidelines (SAP-Security Policy, PCI, SOX, NERC, Custom or others).

A threat detection and mitigation solution then first gives step-by-step instructions on how to fix the gaps, which can be implemented quickly.

Against unknown threats, which also arise from configuration-related risks, solutions provide a near-real timeProtection by blocking attacks until an SAP Security Note is available for it.

At the top of the list is also a Monitoring of abnormal access by internal employees.

The developer who suddenly or at unusual times resorts to instances for accounting should not go undetected and its Accesses be blocked if necessary.

avatar
Mariano Nunez, Onapsis

Mariano Nunez is CEO at Onapsis.


Write a comment

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the second time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork. All information about the event can be found here:

SAP Competence Center Summit 2024

Venue

Event Room, FourSide Hotel Salzburg,
At the exhibition center 2,
A-5020 Salzburg

Event date

June 5 and 6, 2024

Regular ticket:

€ 590 excl. VAT

Venue

Event Room, Hotel Hilton Heidelberg,
Kurfürstenanlage 1,
69115 Heidelberg

Event date

28 and 29 February 2024

Tickets

Regular ticket
EUR 590 excl. VAT
The organizer is the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes the attendance of all lectures of the Steampunk and BTP Summit 2024, the visit of the exhibition area, the participation in the evening event as well as the catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due time.