Thousands of SAP users face cyberattacks over unsecured flaws security
Security researchers working with German software firm SAP have discovered that unpatched instances of the latter’s enterprise resource planning (ERP), customer relationship management (CRM), and other offerings are being actively targeted.
The threats were revealed in a report jointly prepared by SAP and cloud security firm Onapsis.
The duo argues that the report will “help SAP customers protect from active cyber threats seeking to specifically target, identify and compromise organizations running unprotected SAP applications, through a variety of cyberattack vectors.”
We’re looking at how our readers use VPN for a forthcoming in-depth report. We’d love to hear your thoughts in the survey below. It won’t take more than 60 seconds of your time.
Unpatched targets
The report notes six vulnerabilities in particular, going back all the way to 2010. One even has a CVSS severity rating of 10, which is the highest possible score for a vulnerability.
However, in what is fast becoming a major impediment to security, even while SAP has released patches to mitigate all vulnerabilities, hundreds of customers haven’t yet applied them, leaving them prone to threat actors.
According to the report, from the time Onapsis started recording exploitation attempts targeting unpatched SAP apps, in mid-2020, its researchers have seen about 300 successful exploitations through 1500 attack attempts from nearly 20 countries.
“Exploitation would lead to full control of unsecured SAP applications, bypassing common security and compliance controls, enabling attackers to steal sensitive information, perform financial fraud or disrupt mission-critical business processes by deploying ransomware or stopping operations,” note the companies in the report.
The report identifies another worrying trend. According to its observations, the window for patching doesn’t offer much room for contemplation, with some SAP vulnerabilities becoming weaponized in less than 72 hours after public disclosure.
So while not applying patches for years is a sure shot invitation to exploitation, even waiting for a few days can put your SAP instances in danger. The only safeguard is to apply security patches as soon as they are released, which is a practice both companies urge all SAP customers to follow.
Via: ZDNet
Security researchers working with German software firm SAP have discovered that unpatched instances of the latter’s enterprise resource planning (ERP), customer relationship management (CRM), and other offerings are being actively targeted. The threats were revealed in a report jointly prepared by SAP and cloud security firm Onapsis. The duo argues…
Recent Posts
- Mobile industry is quietly preparing for the biggest change to your smartphone in a decade — iSIM will hasten the end of SIM cards and allow networks to preload plans on devices
- Replacing the OLED iPad Pro’s battery is easier than ever
- Ecobee’s Smart Thermostat Premium is nearly matching its all-time low
- The 9 best early Memorial Day TV deals: up to $1,000 off 4K, QLED and OLED TVs
- iPad Pro 2024 teardown video reveals some of Apple’s internal design changes
Archives
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- December 2011