Critical Vulnerability in SAP Solution Manager

Published on 25 Jan 2021

Updated on 25 Jan 2021

The proof of concept (PoC) exploit code for a missing authentication vulnerability (CVE-2020-6207) in SAP Solution Manager (SolMan) is now publicly available. The vulnerability has a Common Vulnerability Scoring System (CVSS) score of 10 out of 10. Attackers may leverage the PoC to compromise unpatched SAP SolMan exposed on the Internet.

The vulnerability is present in SolMan's End user Experience Monitoring (EEM) function with missing authentication checks that would lead to the takeover of connected SAP systems.

Successful exploitation of the vulnerability could allow unauthenticated attackers to remotely access the SolMan HTTP(s) port with no user interaction required.

The vulnerability was patched as part of SAP’s Security Patch Day for March 2020. Users and System Administrators are advised to apply the latest security update immediately.

 

More information is available here:

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6207  

https://www.bleepingcomputer.com/news/security/sap-solman-exploit-released-for-max-severity-pre-auth-flaw/