Active Exploitation of Vulnerability in SAP Business Applications

Number: AL16-009
Date: 12 May 2016

Purpose

The purpose of this alert is to bring attention to the active exploitation of a disclosed vulnerability affecting SAP business applications.

Assessment

CCIRC has been made aware of the exploitation of a vulnerability affecting SAP business applications which can allow an unauthenticated remote attacker full access to the SAP Java platform.

The vulnerability exists in the Invoker Servlet, a built-in component of SAP’s NetWeaver Application Server Java systems (SAP Java platforms).  A security update addressing this vulnerability was released by SAP in 2010, however many systems remain outdated and/or misconfigured. The vulnerability may continue to affect SAP systems.

Suggested Action

Due to the potential risk presented by this vulnerability, CCIRC recommends that system administrators scan their infrastructure for potentially vulnerable systems and follow the vendor recommendations outlined in their Security Note.

References:

Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.
http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/_fl/CCIRCPublicPGPKey.txt

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589
E-mail: ps.communications-communications.sp@canada.ca

Date modified: