Home / os / palm

PwC ACE Software For SAP Security 8.10.304 ABAP Injection

Posted on 30 November -0001

<HTML><HEAD><TITLE>PwC ACE Software For SAP Security 8.10.304 ABAP Injection</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>[ESNC-2041217] Critical Security Vulnerability in PwC ACE Software for SAP Security Please refer to https://www.esnc.de for the original security advisory, updates, and additional information. ---------------------------------------------------------------------- 1. Business Impact ---------------------------------------------------------------------- According to PwC website: - "Using the proprietary ACE software, we perform diagnostics of SAPas inherent risks and backdoors (such as configuration, customization and security settings) which could be exploited to commit fraud"; - "The purpose of this tool is to analyze SAP security settings and identify privileged access and potential segregation of duties issues accurately and efficiently"; and - "The ABAP files introduce no changes to the production systems and settings". PwC ACE software has a remotely exploitable security vulnerability which allows injection and execution of malicious ABAP code on the remote SAP system. Based on the business processes implemented on the SAP systems on which ACE is installed, this security vulnerability may allow an attacker to e.g. manipulate accounting documents and financial results, bypass change management controls, and bypass segregation of duties restrictions. This activity may result in fraud, theft or manipulation of sensitive data including PII such as customer master data and HR payroll information, unauthorized payment transactions and transfer of money. The attacks may be executed from the local network via SAPGui, or from the public Internet via http/https ICF services such as WebGui and Report, if the systems are accessible. An attacker can misuse PwC ACE security vulnerability in order to: - make changes to the production systems and their settings including manipulating or corrupting ABAP programs shipped by SAP and making the system and data inoperable; - plant an SAP backdoor for accessing the system and sensitive data later; and - shut down the SAP systems and cause downtime. An in-depth analysis is required to determine whether the system or the financial data is already compromised via this security vulnerability. Risk Level: High ---------------------------------------------------------------------- 2. Advisory Information ---------------------------------------------------------------------- - ESNC Security Advisory ID: ESNC-2041217 - CVE ID: CVE-2016-9832 - Original security advisory and updates: https://www.esnc.de/security-advisories/vulnerability-in-pwc-ace-for-sap-security - Reporting Date: 19.08.2016 - Vulnerability location: User input - Affected versions: 8.10.304 (and possibly others, contact vendor for accurate information) - Vendor Patch Date: Contact vendor - Public Advisory Date: 07.12.2016 - Researcher: Ertunga Arsal and Mert Suoglu ---------------------------------------------------------------------- 3. Vulnerability Information ---------------------------------------------------------------------- - Vendor: PricewaterhouseCoopers (PwC) - Affected Software: ACE-ABAP 8.10.304 - Vulnerability Class: System Compromise, Remote Arbitrary Code Execution, ABAP Injection - CVSS v3 base score: 9.9 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/ S:C/C:H/I:H/A:H) - Remotely Exploitable: Yes - Authentication Required: Yes - Additional Notes: An exploit for this vulnerability is available for ESNC Security Suite Penetration Testing Module customers per individual request. Information about ABAP injection can be found at https://www.enterprise-threat-monitor.com/code-security-vulnerabilities-abap-injection ---------------------------------------------------------------------- 4. Vulnerability Timeline ---------------------------------------------------------------------- 19.08.2016 PwC contacted 22.08.2016 Meeting with PwC, informed them about the impact and the details of the vulnerability and responsible disclosure 05.09.2016 Asked PwC about updates and whether a patch is available 13.09.2016 Received a Cease & Desist letter from PwC lawyers 18.11.2016 Informed that 90 days have passed and ESNC is planning to release a security advisory; asked for any details PwC can share about this matter including risk, affected versions, how to obtain a patch 22.11.2016 Received another Cease & Desist letter from PwC lawyers 07.12.2016 Public disclosure ---------------------------------------------------------------------- 5. Solution & Recommendations ---------------------------------------------------------------------- Enterprise Threat Monitor customers which are running the latest 0-day threat definitions have protection and mitigation capabilities for this vulnerability since August, 2016. For SAP systems which contain sensitive information, we recommend checking the misuse of this ABAP program and existence of ABAP backdoors, if a vulnerable ACE version was installed previously. We recommend removing vulnerable versions of ACE. ---------------------------------------------------------------------- About ESNC ---------------------------------------------------------------------- ESNC GmbH, Germany is an independent company specialized in SAP security audit, SAP penetration testing, ABAP security analysis, SAP vulnerability assessment, and SAP SIEM integration services for protecting SAP systems from data breaches and for detecting and responding to the SAP specific attacks timely. Its flagship product ESNC Security Suite is used by many large enterprises for compliance controls, vulnerability scanning their SAP ABAP, Java and Hana systems, and for running ABAP code security analysis to reduce risks affecting critical business processes and data. ESNC Security Suite's real-time SAP security monitoring module Enterprise Threat Monitor allows SAP specific enterprise threat detection and integrating SAP security with SIEM solutions such as IBM QRadar, HP ArcSight, and Splunk Enterprise. For more information about our products and services, please visit our web page at https://www.esnc.de or https://www.enterprise-threat-monitor.com </BODY></HTML>

 

TOP