Skip to content

Problems encountered in SAP's artificial intelligence capabilities

On the 17th of July, 2024, Hillai Ben-Sasson, a security specialist hailing from WIZ, a cloud organization, disclosed the findings of an examination concerning SAP's cloud AI services. This investigation was an extension of a wider probe into major AI cloud providers like Hugging Face and...

Identified Issues in SAP Artificial Intelligence Capabilities
Identified Issues in SAP Artificial Intelligence Capabilities

Problems encountered in SAP's artificial intelligence capabilities

A recent investigation by security researcher Hillai Ben-Sasson of WIZ, published on July 17, 2024, has shed light on several vulnerabilities in the cloud infrastructure of SAP Core AI Service. The investigation underscores the importance of securing cloud environments beyond a company's premises.

The investigation revealed that many applications within the network were not properly secured and had their own vulnerabilities. One such vulnerability allowed a user to change the user ID to any value (except root) and take over the network rules bound to a specific user ID. The user ID in question was the reserved user ID configured for the istio Sidecar Proxy (1337).

The vulnerability could potentially have allowed an attacker to gain access to other customers' training data and internal cloud environments using the SAP Core AI Service. This incident highlights the potential risks associated with cloud environments and the need for robust security measures.

SAP has taken steps to address these vulnerabilities. For instance, SAP Security Note 3413475 fixed CVE(s) 2023-49583 and CVE-2023-50422, while SAP Security Note 3411067 addressed CVE(s): CVE-2023-49583, CVE-2023-50422, CVE-2023-50423, and CVE-2023-50424.

As companies increasingly migrate traditional SAP applications like SAP S/4HANA to public cloud providers such as GCP, Azure, or AWS, the security of these environments becomes paramount. Companies operating and using SAP applications or services should integrate them into their existing security processes, including Vulnerability Management, Configuration Management, Threat Detection, Continuous Monitoring, Secure Development Lifecycle, and DevSecOps.

Moreover, the growing acceptance of SAP Business Technology Platform (BTP) and its cloud services for application development in the cloud, as well as integration with on-premise applications, is driving a trend towards Platform as a Service in the Cloud (PaaS). On-premise applications, such as traditional ABAP or Java-based applications like SAP ERP, S/4HANA, SAP Solution Manager, SAP Portal, or SAP PI/PO, should also be secured appropriately.

The threat landscape for SAP applications is evolving, with recent threat data from Onapsis and Flashpoint indicating an increase in exploits, vulnerabilities, and ransomware. Companies must remain vigilant and proactive in securing their SAP environments, whether they are on-premise, in the cloud, or a combination of both (hybrid).

By integrating SAP applications and services into their existing IT security processes, companies can prevent the introduction of new vulnerabilities into the organization and holistically manage existing risks, from on-premise applications to cloud environments and services. This approach ensures a comprehensive and effective security strategy for SAP environments.

Read also:

Latest