Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

CVE-2020-26829 Missing Authentication Check In SAP NetWeaver AS JAVA (P2P Cluster Communication), SAP security note 2974774

Description

P2P Cluster Communication is dedicated for the server nodes in the cluster to exchange messages between each other. However, due to implementation flaw, it accepts arbitrary connections even from processes that are outside the cluster and even outside the network segment dedicated for the internal cluster communication. As result, an unauthenticated attacker can invoke certain functions that would otherwise be restricted to system administrators only, including access to system administration functions or shutting down the system completely.

Available fix and Supported packages

  • SERVERCORE | 7.10 | 7.10
  • SERVERCORE | 7.11 | 7.11
  • SERVERCORE | 7.20 | 7.20
  • SERVERCORE | 7.30 | 7.30
  • SERVERCORE | 7.31 | 7.31
  • SERVERCORE | 7.40 | 7.40
  • SERVERCORE | 7.50 | 7.50
  • J2EE ENGINE SERVERCORE 7.10 | SP024 | 000010
  • J2EE ENGINE SERVERCORE 7.10 | SP025 | 000007
  • J2EE ENGINE SERVERCORE 7.11 | SP019 | 000010
  • J2EE ENGINE SERVERCORE 7.11 | SP020 | 000005
  • J2EE ENGINE SERVERCORE 7.20 | SP009 | 000153
  • J2EE ENGINE SERVERCORE 7.30 | SP015 | 000032
  • J2EE ENGINE SERVERCORE 7.30 | SP016 | 000036
  • J2EE ENGINE SERVERCORE 7.30 | SP017 | 000043
  • J2EE ENGINE SERVERCORE 7.30 | SP018 | 000047
  • J2EE ENGINE SERVERCORE 7.30 | SP019 | 000032
  • J2EE ENGINE SERVERCORE 7.30 | SP020 | 000020
  • J2EE ENGINE SERVERCORE 7.30 | SP021 | 000000
  • J2EE ENGINE SERVERCORE 7.31 | SP022 | 000047
  • J2EE ENGINE SERVERCORE 7.31 | SP023 | 000035
  • J2EE ENGINE SERVERCORE 7.31 | SP024 | 000033
  • J2EE ENGINE SERVERCORE 7.31 | SP025 | 000027
  • J2EE ENGINE SERVERCORE 7.31 | SP026 | 000023
  • J2EE ENGINE SERVERCORE 7.31 | SP027 | 000006
  • J2EE ENGINE SERVERCORE 7.31 | SP028 | 000000
  • J2EE ENGINE SERVERCORE 7.40 | SP017 | 000047

Affected component

    BC-JAS-COR-CLS
    Clustering

CVSS

Score: 10.0
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected].

URL

https://launchpad.support.sap.com/#/notes/2974774

TAGS

#Cluster-Manager
#P2P-Cluster-Communication
#Join-Port
#Broken-Authentication
#&160-CVE-2020-26829

More to explorer

SAP Security For All

RedRays Security Platform for Penetration testers and Bug hunters

The product package is specifically created for cyber security experts who have encountered SAP while participating in bug bounty programs.

RedRays Security Platform for SAP Consultants

The product package is designed for SAP consultants conducting security assessments of SAP ERP systems. We provide essential tools and resources to help professionals in this field conduct their work effectively.

RedRays Security Platform for Enterprises

The product package is specifically optimized to cater to the needs of both small/medium and large companies who are seeking to streamline the process of organizing a comprehensive security system for ERP systems.