Menu
US sounds alarm after SAP bug found affecting multinationals

US sounds alarm after SAP bug found affecting multinationals

The bug was patched by SAP over five years ago, but many systems remain vulnerable

The U.S. government is warning major corporations to check the configuration of their SAP software systems after a computer security company discovered at least 36 global enterprises were still vulnerable to a significant bug patched more than five years ago.

The bug allows hackers to remotely gain full administrative access to SAP systems and affects at least 18 of the company's software systems, according to security vendor Onapsis.

Using it, attackers can gain "complete control of the business information and processes on these systems, as well as potential access to other systems," the U.S. Department of Homeland Security said in a bulletin. It's only the third time this year the department has issued such a notice.

Whether a businesses cloud platform is vulnerable depends on its specific configuration and any custom applications that are running.

During its research, Onapsis discovered major companies in the U.S., U.K., Germany, China, India, Japan, and South Korea were vulnerable. The company's work covered a number of industries including oil and gas, telecommunications, utilities, retail, automotive, and steel manufacturing.

SAP issued its patch in 2010, so why is the bug still a problem?

Onapsis doesn't fault SAP but instead blames a lack of visibility and governance of cybersecurity issues and risks by companies on SAP systems once they are installed.

"This is a responsibility that falls on SAP customers' information security teams, service providers, and external audit firms," it said.

As an immediate response, DHS recommends companies follow SAP Security Note 1445998 and disable the Invoker Servlet. It's this bug that is being leveraged with a sensitive SAP Java application to gain admin access to systems, said Onapsis.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
Show Comments