CVE-2022-35295
Sap Host Agent vulnerability analysis and mitigation

Overview

In SAP Host Agent (SAPOSCOL) version 7.22, a vulnerability was discovered that allows an attacker to use files created by saposcol to escalate privileges. The vulnerability was identified in February 2022 and publicly disclosed on September 13, 2022. This issue affects the SAP Host Agent component, which is responsible for life-cycle management tasks including operating system monitoring, database monitoring, and system instance control (SEC Consult).

Technical details

The vulnerability stems from multiple issues related to UNIX insecure file handling in the saposcol process. The main saposcol service runs with root privileges and creates files in its default working directory (/usr/sap/tmp). The process follows symbolic links when trying to open/create these files without proper verification, allowing an attacker to manipulate file access. The vulnerability received a CVSS v3 base score of 4.9, indicating medium severity, with attack vector being Network, requiring High privileges, and no user interaction needed (AttackerKB).

Impact

The vulnerability allows an authenticated attacker with adm privileges to escalate to root privileges on UNIX systems. This could lead to full system compromise, allowing the attacker to read, write, or corrupt files owned by the root user account. The impact is particularly severe as it affects critical system files and could lead to unauthorized access to sensitive data (SEC Consult).

Mitigation and workarounds

SAP has released a patch in Security Note 3159736 which should be installed immediately. As a workaround, organizations can remove write access to the DIR_PERF (e.g., /usr/sap/tmp) directory for the adm account, though this may interfere with other programs such as CCMS (SEC Consult).

Additional resources


SourceThis report was generated using AI

Related Sap Host Agent vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-40309CRITICAL9.8
  • SAP HANASAP HANA
  • cpe:2.3:a:sap:host_agent
NoYesSep 12, 2023
CVE-2023-40308HIGH7.5
  • SAP HANASAP HANA
  • cpe:2.3:a:sap:hana_database
NoYesSep 12, 2023
CVE-2023-27498HIGH7.2
  • Sap Host AgentSap Host Agent
  • cpe:2.3:a:sap:host_agent
NoNoMar 14, 2023
CVE-2024-47595HIGH7.1
  • Sap Host AgentSap Host Agent
  • cpe:2.3:a:sap:host_agent
NoNoNov 12, 2024
CVE-2023-36926MEDIUM5.3
  • Sap Host AgentSap Host Agent
  • cpe:2.3:a:sap:host_agent
NoNoAug 08, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management