CVE-2022-41264: CWE-94 Improper Control of Generation of Code ('Code Injection') in SAP BASIS
Due to the unrestricted scope of the RFC function module, SAP BASIS - versions 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, 791, allows an authenticated non-administrator attacker to access a system class and execute any of its public methods with parameters provided by the attacker. On successful exploitation the attacker can have full control of the system to which the class belongs, causing a high impact on the integrity of the application.
AI Analysis
Technical Summary
CVE-2022-41264 is a code injection vulnerability classified under CWE-94, affecting multiple versions of SAP BASIS, specifically versions 731 through 757 and 789 through 791. The vulnerability arises due to an unrestricted scope in a Remote Function Call (RFC) function module, which allows an authenticated attacker without administrative privileges to access a system class and invoke any of its public methods with attacker-controlled parameters. This capability effectively enables the attacker to execute arbitrary code within the SAP system context. The exploitation does not require administrator rights but does require valid authentication, which could be obtained through compromised credentials or other means. Successful exploitation can lead to full control over the affected SAP system, severely impacting the integrity of applications and potentially compromising confidentiality and availability as well. The vulnerability is particularly dangerous because SAP BASIS is a core component responsible for the underlying technical infrastructure of SAP applications, meaning that exploitation could have widespread effects across business-critical processes. No public exploits have been reported in the wild as of the publication date, and no official patches or updates are linked in the provided information, indicating the need for proactive mitigation measures by affected organizations.
Potential Impact
For European organizations, the impact of CVE-2022-41264 could be substantial, especially for those heavily reliant on SAP ERP systems for enterprise resource planning, supply chain management, and financial operations. Exploitation could lead to unauthorized code execution, data manipulation, and potential disruption of critical business functions. This could result in financial losses, regulatory non-compliance (particularly under GDPR due to potential data breaches), and reputational damage. Given SAP's widespread adoption in sectors such as manufacturing, automotive, pharmaceuticals, and public administration across Europe, the vulnerability poses a risk to operational continuity and data integrity. Additionally, attackers gaining control over SAP BASIS could pivot to other parts of the corporate network, increasing the scope of compromise. The medium severity rating suggests that while the vulnerability is serious, exploitation requires authenticated access, which somewhat limits the attack surface but does not eliminate the risk, especially in environments with weak access controls or compromised credentials.
Mitigation Recommendations
Implement strict access controls and enforce the principle of least privilege for all SAP user accounts to minimize the risk of unauthorized authenticated access. Conduct thorough audits of SAP user accounts and sessions to detect unusual or unauthorized access patterns, focusing on non-administrator accounts with elevated privileges. Apply SAP security notes and patches as soon as they become available from SAP, even though no patch links are currently provided, monitoring SAP’s official channels for updates related to this vulnerability. Use SAP’s Security Audit Log and System Trace tools to monitor and log RFC calls and method invocations to detect potential exploitation attempts. Restrict network access to SAP systems by implementing network segmentation and firewall rules that limit RFC access to trusted hosts and networks only. Implement multi-factor authentication (MFA) for SAP user logins to reduce the risk of credential compromise leading to exploitation. Regularly update and harden the SAP BASIS environment, including disabling unused RFC function modules and reviewing custom code for similar injection risks. Educate SAP administrators and security teams about this vulnerability and encourage proactive monitoring for indicators of compromise related to unauthorized method executions.
Affected Countries
Germany, France, Italy, Spain, Netherlands, United Kingdom, Sweden, Belgium, Poland, Austria
CVE-2022-41264: CWE-94 Improper Control of Generation of Code ('Code Injection') in SAP BASIS
Description
Due to the unrestricted scope of the RFC function module, SAP BASIS - versions 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, 791, allows an authenticated non-administrator attacker to access a system class and execute any of its public methods with parameters provided by the attacker. On successful exploitation the attacker can have full control of the system to which the class belongs, causing a high impact on the integrity of the application.
AI-Powered Analysis
Technical Analysis
CVE-2022-41264 is a code injection vulnerability classified under CWE-94, affecting multiple versions of SAP BASIS, specifically versions 731 through 757 and 789 through 791. The vulnerability arises due to an unrestricted scope in a Remote Function Call (RFC) function module, which allows an authenticated attacker without administrative privileges to access a system class and invoke any of its public methods with attacker-controlled parameters. This capability effectively enables the attacker to execute arbitrary code within the SAP system context. The exploitation does not require administrator rights but does require valid authentication, which could be obtained through compromised credentials or other means. Successful exploitation can lead to full control over the affected SAP system, severely impacting the integrity of applications and potentially compromising confidentiality and availability as well. The vulnerability is particularly dangerous because SAP BASIS is a core component responsible for the underlying technical infrastructure of SAP applications, meaning that exploitation could have widespread effects across business-critical processes. No public exploits have been reported in the wild as of the publication date, and no official patches or updates are linked in the provided information, indicating the need for proactive mitigation measures by affected organizations.
Potential Impact
For European organizations, the impact of CVE-2022-41264 could be substantial, especially for those heavily reliant on SAP ERP systems for enterprise resource planning, supply chain management, and financial operations. Exploitation could lead to unauthorized code execution, data manipulation, and potential disruption of critical business functions. This could result in financial losses, regulatory non-compliance (particularly under GDPR due to potential data breaches), and reputational damage. Given SAP's widespread adoption in sectors such as manufacturing, automotive, pharmaceuticals, and public administration across Europe, the vulnerability poses a risk to operational continuity and data integrity. Additionally, attackers gaining control over SAP BASIS could pivot to other parts of the corporate network, increasing the scope of compromise. The medium severity rating suggests that while the vulnerability is serious, exploitation requires authenticated access, which somewhat limits the attack surface but does not eliminate the risk, especially in environments with weak access controls or compromised credentials.
Mitigation Recommendations
Implement strict access controls and enforce the principle of least privilege for all SAP user accounts to minimize the risk of unauthorized authenticated access. Conduct thorough audits of SAP user accounts and sessions to detect unusual or unauthorized access patterns, focusing on non-administrator accounts with elevated privileges. Apply SAP security notes and patches as soon as they become available from SAP, even though no patch links are currently provided, monitoring SAP’s official channels for updates related to this vulnerability. Use SAP’s Security Audit Log and System Trace tools to monitor and log RFC calls and method invocations to detect potential exploitation attempts. Restrict network access to SAP systems by implementing network segmentation and firewall rules that limit RFC access to trusted hosts and networks only. Implement multi-factor authentication (MFA) for SAP user logins to reduce the risk of credential compromise leading to exploitation. Regularly update and harden the SAP BASIS environment, including disabling unused RFC function modules and reviewing custom code for similar injection risks. Educate SAP administrators and security teams about this vulnerability and encourage proactive monitoring for indicators of compromise related to unauthorized method executions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2022-09-21T16:20:14.948Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf7433
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 6:07:40 PM
Last updated: 8/2/2025, 4:45:48 AM
Views: 14
Related Threats
CVE-2025-8935: SQL Injection in 1000 Projects Sales Management System
MediumCVE-2025-8934: Cross Site Scripting in 1000 Projects Sales Management System
MediumCVE-2025-8933: Cross Site Scripting in 1000 Projects Sales Management System
MediumCVE-2025-8932: SQL Injection in 1000 Projects Sales Management System
MediumCVE-2025-8931: SQL Injection in code-projects Medical Store Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.