Global Fortune 1000 companies, major governmental organizations and defense agencies, share something in common: they all rely on SAP platforms to handle their most critical business processes and iinformation. In this scenario, any criminal cyber attacks seeking to conduct espionage, sabotage, or financial fraud, knows that these systems contain the jewels in the crown.
In all SAP implementations there is a special system that acts as the "brain" of the platform: the SAP Solution Manager. Using proprietary interfaces and protocols, the Solution Manager connects and manages all SAP "satellites" of implementation (ERP, CRM, SCM, etc.) systems. Therefore, if an attacker compromises the SolMan, might be able to expand its control over all environments that are under control. Moreover, because of weaknesses in architecture, a malicious group would be possible to start by compromising one of the first satellite systems, and use it as a pivot to control the SolMan.
In this talk we present, through various live demonstrations, novel attack vectors that a hacker can use in intrusion attempt to SAP Solution Manager, and result in a total compromise to the SAP implementation. We will analyze the technical origins of vulnerabilities that allow such attacks, and give you mitigation information about these threats in your organization.
Inception of the SAP Platforms Brain: Attacks on SAP Solution Manager
1. Inception of the SAP®
Platform's Brain
Attacks on SAP Solution Manager
November 30th
, 2012
DeepSec, Vienna.
Juan Perez-EtchegoyenJuan Perez-Etchegoyen
jppereze@onapsis.comjppereze@onapsis.com
10. Over 95% of the SAP systems we
evaluated were exposed to
espionage, sabotage and fraud
cyber attacks.
Attackers do not need access credentials to perform
these attacks!