home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   ANTI_VIRUS      Anti-Virus Discussion & News      523 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 301 of 523   
   Ben Ritchey to All   
   CERT Exploit warning   
   11 May 16 10:37:40   
   
   U.S. Department of Homeland Security US-CERT   
      
   National Cyber Awareness System:   
      
   TA16-132A: Exploitation of SAP Business Applications   
   05/11/2016 07:31 AM EDT   
      
      
   Original release date: May 11, 2016   
      
   Systems Affected   
   Outdated or misconfigured SAP systems   
      
   Overview   
   At least 36 organizations worldwide are affected by an SAP vulnerability [1].   
   Security researchers from Onapsis discovered indicators of exploitation   
   against these organizations’ SAP business applications.   
      
   The observed indicators relate to the abuse of the Invoker Servlet, a built-in   
   functionality in SAP NetWeaver Application Server Java systems (SAP Java   
   platforms). The Invoker Servlet contains a vulnerability that was patched by   
   SAP in 2010. However, the vulnerability continues to affect outdated and   
   misconfigured SAP systems.   
      
   Description   
   SAP systems running outdated or misconfigured software are exposed to   
   increased risks of malicious attacks.   
      
   The Invoker Servlet vulnerability affects business applications running on SAP   
   Java platforms.   
      
   SAP Java platforms are the base technology stack for many SAP business   
   applications and technical components, including:   
      
   SAP Enterprise Resource Planning (ERP),   
   SAP Product Lifecycle Management (PLM),   
   SAP Customer Relationship Management (CRM),   
   SAP Supply Chain Management (SCM),   
   SAP Supplier Relationship Management (SRM),   
   SAP NetWeaver Business Warehouse (BW),   
   SAP Business Intelligence (BI),   
   SAP NetWeaver Mobile Infrastructure (MI),   
   SAP Enterprise Portal (EP),   
   SAP Process Integration (PI),   
   SAP Exchange Infrastructure (XI),   
   SAP Solution Manager (SolMan),   
   SAP NetWeaver Development Infrastructure (NWDI),   
   SAP Central Process Scheduling (CPS),   
   SAP NetWeaver Composition Environment (CE),   
   SAP NetWeaver Enterprise Search,   
   SAP NetWeaver Identity Management (IdM), and   
   SAP Governance, Risk & Control 5.x (GRC).   
   The vulnerability resides on the SAP application layer, so it is independent   
   of the operating system and database application that support the SAP system.   
      
   Impact   
   Exploitation of the Invoker Servlet vulnerability gives unauthenticated remote   
   attackers full access to affected SAP platforms, providing complete control of   
   the business information and processes on these systems, as well as potential   
   access to other systems.   
      
   Solution   
   In order to mitigate this vulnerability, US-CERT recommends users and   
   administrators implement SAP Security Note 1445998 and disable the Invoker   
   Servlet. For more mitigation details, please review the Onapsis threat report   
   [1].   
      
   In addition, US-CERT encourages that users and administrators:   
      
   Scan systems for all known vulnerabilities, such as missing security patches   
   and dangerous system configurations.   
   Identify and analyze the security settings of SAP interfaces between systems   
   and applications to understand risks posed by these trust relationships.   
   Analyze systems for malicious or excessive user authorizations.   
   Monitor systems for indicators of compromise resulting from the exploitation   
   of vulnerabilities.   
   Monitor systems for suspicious user behavior, including both privileged and   
   non-privileged users.   
   Apply threat intelligence on new vulnerabilities to improve the security   
   posture against advanced targeted attacks.   
   Define comprehensive security baselines for systems and continuously monitor   
   for compliance violations and remediate detected deviations.   
   These recommendations apply to SAP systems in public, private, and hybrid   
   cloud environments.   
      
   Note: The U.S. Government does not endorse or support any particular product   
   or vendor.   
      
   References   
   [1] Onapsis Threat Report: Wild Exploitation & Cyber-Attacks on SAP Business   
   Applications   
   [2] SAP: Invoker Servlet   
   Revision History   
   May 11, 2016: Initial Release   
      
   ----------------------------------------------------------------   
   -------------- -   
      
   This product is provided subject to this Notification and this Privacy & Use   
   policy.   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   A copy of this publication is available at www.us-cert.gov. If you need help   
   or have questions, please send an email to info@us-cert.gov. Do not reply to   
   this message since this email was sent from a notification-only address that   
   is not monitored. To ensure you receive future US-CERT products, please add   
   US-CERT@ncas.us-cert.gov to your address book.   
   OTHER RESOURCES:   
   Contact Us | Security Publications | Alerts and Tips | Related Resources   
   STAY CONNECTED:   
   Sign up for email updates   
      
   SUBSCRIBER SERVICES:   
   Manage Preferences  |  Unsubscribe  |  Help   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf   
   of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray   
   Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 Powered by GovDelivery   
      
   === Cut ===   
      
      
   --   
   Keep the faith   :^)   
      
      Ben  aka cMech  Web: http|ftp|telnet://cmech.dynip.com   
                    Email: fido4cmech(at)lusfiber.net   
                 Home page: http://cmech.dynip.com/homepage/   
              WildCat! Board 24/7  +1-337-984-4794  any BAUD 8,N,1   
      
   --- GoldED+/W32-MSVC   
    * Origin: FIDONet - The Positronium Repository (1:393/68)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca