The U.S. government is warning major corporations to check the configuration of their SAP software systems after a computer security company discovered at least 36 global enterprises were still vulnerable to a significant bug patched more than five years ago.
The bug allows hackers to remotely gain full administrative access to SAP systems and affects at least 18 of the company's software systems, according to security vendor Onapsis.
Using it, attackers can gain "complete control of the business information and processes on these systems, as well as potential access to other systems," the U.S. Department of Homeland Security said in a bulletin. It's only the third time this year the department has issued such a notice.
Whether a businesses cloud platform is vulnerable depends on its specific configuration and any custom applications that are running.
During its research, Onapsis discovered major companies in the U.S., U.K., Germany, China, India, Japan, and South Korea were vulnerable. The company's work covered a number of industries including oil and gas, telecommunications, utilities, retail, automotive, and steel manufacturing.
SAP issued its patch in 2010, so why is the bug still a problem?
Onapsis doesn't fault SAP but instead blames a lack of visibility and governance of cybersecurity issues and risks by companies on SAP systems once they are installed.
"This is a responsibility that falls on SAP customers' information security teams, service providers, and external audit firms," it said.
As an immediate response, DHS recommends companies follow SAP Security Note 1445998 and disable the Invoker Servlet. It's this bug that is being leveraged with a sensitive SAP Java application to gain admin access to systems, said Onapsis.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.