Application Security

8/2/2016
04:00 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

Awareness Improving But Security Still Lags For SAP Implementations

SAP ecosystem a huge Achilles heel for enterprise system security, report says.

While SAP makes some of the most business-critical applications used by enterprises today, it has taken some time for the IT world to get serious about securing SAP infrastructure. In the wake of a several high-profile incidents involving SAP over the past year -- and an increasing focus by analysts on SAP defense issues -- SAP awareness is at an all-time high in 2016. But the statistics show that there's a lot of work to do in order to turn that awareness into meaningful protection for business-critical applications.

So says a new report out this week by ERPScan, which takes an in-depth look at the state of threats and protections around the global SAP ecosystem. As the report notes, 90% of the Fortune 2000 uses SAP and last year there were vulnerabilities in almost every SAP module, with CRM carrying the bulk of reported vulnerabilities. The footprint for possible SAP system exposure continues to grow beyond the traditional triumvirate of customer resource planning (CRM), supplier relationship management (SRM), and enterprise resource management (ERP) the firm is known for as it expands into IoT connections and mobility through its SAP HANA and SAP Mobile apps. As an example, a recent issue in SAP Mobile affected over a million mobile devices in 2015.

The firm reports that there are three big factors that make it difficult for enterprises to get SAP security under control. The first is a lack of qualified specialists in the field of protecting SAP. These applications are typically run by SAP specialists who often operate with dotted-line reporting to IT, outside the typical control of IT security teams. These specialists have very little security experience, and at the same time "security officers hardly understand SAP threats, not to mention methods and approaches of preventing them," the report notes.

Meanwhile, most SAP systems are highly flexible with a wide range of advanced configurations available -- there are more than 1,000 parameters in a standard system configuration alone, so there is no one gold standard for proper builds. Adding even more complication is the fact that these systems are usually very extensible and customized, with lots of home-brewed applications built on top of them.

As a result, it should hardly be a surprise that not only are there vulnerabilities in the software but many implementations are flawed from a security perspective. According to ERPScan, its scans of the worldwide SAP global landscape shows more than 36,000 SAP systems vulnerable to some kind of vulnerability or configuration issue. Of those, 69% shouldn't even be available directly through the internet, and yet they are.

These kinds of flaws are starting to gain the attention of attackers, who are recognizing the inherent vulnerability of these systems along with the extremely valuable data that they typically store and transmit. Most recently, in May, US CERT warned organizations of a widespread attack against dozens of global organizations that were hit using a vulnerability that SAP first offered a patch for over six years ago.

SAP provided this statement:

“SAP Product Security Response Team collaborates frequently with research companies like ERPScan and Onapsis to ensure a responsible disclosure of vulnerabilities. Security patches are available for download on the SAP Service Marketplace. We strongly advise our customers to secure their SAP landscape by applying the available security patches from the SAP Service Marketplace immediately.”

 Related Content: 

 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
Good Times in Security Come When You Least Expect Them
Joshua Goldfarb, Co-founder & Chief Product Officer, IDRRA ,  10/23/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.