This site uses cookies to enhance your experience.  By continuing to visit this website, you consent to the use of these cookies. Click here to learn more about our privacy policy.

Sanfor Technologies Blog Background Image

SAP Solution Manager Remote Code Execution Vulnerability CVE-2020-6207

2021-02-04
10

Description

Introduction

SAP Solution Manager (sometimes referred to as "SolMan" by administrators) is an application lifecycle management (ALM) platform used for implementing, maintaining, and integrating SAP systems, troubleshooting problems, while ensuring monitored systems are safe, clean, and run smoothly.

As the main management solution for SAP users, SAP Solution Manager combines different tools and direct access to SAP to ensure its reliability and stability.

This tool helps system administrators make changes to IT environments, monitor solutions in real-time, integrate new on-premise or cloud solutions, test solution updates, record business processes, and control access privileges, among many other functions.

Summary

The Sangfor Security Team detected that a remote code execution vulnerability CVE-2020-6207 in the SAP Solution Manager component was disclosed. The vulnerability has been classified as critical and was caused by a lack of authentication in the SAP Solution Manager End User Experience Monitoring (EEM). EEM can be used to deploy scripts on other systems, resulting in remote code execution. Attackers can craft malicious data to perform remote code execution, thereby controlling all systems connected to the SAP Solution Manager and executing arbitrary code.

Impact

SAP Solution Manager is very popular due to its reliability and stability. This vulnerability is classified as critical and received a 10 out of 10 score on the Common Vulnerability Scoring System (CVSS).

Affected SAP Solution Manager Versions:
SAP Solution Manager 7.2 and earlier versions

Timeline

  • Mar 10, 2020 Researchers published their results at the 2020 Black Hat Security Conference and disclosed this vulnerability.
  • Jan 14, 2021 The Proof of Concept (PoC) exploit of this vulnerability was released on GitHub.
  • Jan 27, 2021 Sangfor FarSight Labs released a vulnerability alert and solutions.

Remediation Solution

SAP has released a patch to fix this vulnerability. Please download and install it from the following link: https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305

Sangfor Solution

  1. For Sangfor NGAF customers, click Update on Security Capability Update.
  2. Sangfor Cloud WAF has automatically updated its database in the cloud. Users are already protected from this vulnerability without any additional operation required.
  3. Sangfor Cyber Command detects attacks which exploit this vulnerability and can alert users in real-time. Users can integrate Cyber Command with NGAF to block an attacker's IP address.
  4. Sangfor SOC has Sangfor security specialists available 24/7 to help you resolve any security issues. After rule update release, Sangfor security experts check and update the customer's vulnerability detection equipment and perform a vulnerability scan of the customer's network environment to ensure that the customer's host is free from this vulnerability. For users with vulnerabilities, the SOC regularly reviews and updates device policies to ensure protection against this vulnerability.