Skip to main content

CVE-2024-24740: CWE-732: Incorrect Permission Assignment for Critical Resource in SAP_SE SAP NetWeaver Application Server ABAP (SAP Kernel)

Medium
VulnerabilityCVE-2024-24740cvecve-2024-24740cwe-732
Published: Tue Feb 13 2024 (02/13/2024, 02:35:21 UTC)
Source: CVE
Vendor/Project: SAP_SE
Product: SAP NetWeaver Application Server ABAP (SAP Kernel)

Description

SAP NetWeaver Application Server (ABAP) - versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94, KRNL64UC 7.53, under certain conditions, allows an attacker to access information which could otherwise be restricted with low impact on confidentiality of the application.

AI-Powered Analysis

AILast updated: 07/05/2025, 00:42:39 UTC

Technical Analysis

CVE-2024-24740 is a medium severity vulnerability identified in the SAP NetWeaver Application Server ABAP kernel, affecting multiple versions including KERNEL 7.53, 7.54, 7.77, 7.85, 7.89, 7.93, 7.94, and KRNL64UC 7.53. The vulnerability is classified under CWE-732, which relates to incorrect permission assignment for critical resources. Specifically, under certain conditions, this flaw allows an attacker to gain unauthorized access to information that should otherwise be restricted within the SAP application environment. The vulnerability does not require any privileges or user interaction to exploit (CVSS vector: AV:N/AC:L/PR:N/UI:N), indicating that it can be triggered remotely over the network with low attack complexity. However, the impact on confidentiality is limited (only partial information disclosure), and there is no impact on integrity or availability. The vulnerability arises from improper permission settings in the SAP kernel, which is a core component responsible for running ABAP applications and managing critical system resources. Although no known exploits are currently reported in the wild, the presence of this vulnerability in widely used SAP NetWeaver kernel versions makes it a significant concern for organizations relying on SAP for enterprise resource planning and business-critical operations. The lack of a published patch at the time of disclosure further emphasizes the need for immediate attention and mitigation by affected organizations.

Potential Impact

For European organizations, the impact of CVE-2024-24740 can be significant given the widespread adoption of SAP NetWeaver in industries such as manufacturing, finance, utilities, and public sector entities. Unauthorized information disclosure could lead to leakage of sensitive business data, intellectual property, or personally identifiable information (PII), potentially violating GDPR and other data protection regulations. Although the confidentiality impact is rated low, even limited data exposure can have regulatory and reputational consequences in Europe. Additionally, attackers exploiting this vulnerability could use the disclosed information as a foothold for further attacks or lateral movement within the network. The vulnerability’s remote exploitability without authentication increases the risk profile, especially for SAP systems exposed to external networks or insufficiently segmented internal environments. Given SAP’s critical role in business processes, any compromise or data leakage could disrupt operations, cause financial losses, and erode customer trust.

Mitigation Recommendations

1. Immediate review and hardening of SAP NetWeaver kernel permissions: Administrators should audit and correct permission assignments on critical resources to ensure they adhere to the principle of least privilege. 2. Network segmentation and access controls: Restrict access to SAP NetWeaver systems to trusted internal networks and VPNs only, minimizing exposure to external threats. 3. Monitor SAP system logs and network traffic for unusual access patterns or unauthorized information queries that could indicate exploitation attempts. 4. Engage with SAP support and subscribe to SAP Security Notes for timely updates and patches addressing this vulnerability once available. 5. Implement compensating controls such as Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures tuned to detect suspicious SAP kernel activity. 6. Conduct regular security assessments and penetration testing focused on SAP environments to identify and remediate permission misconfigurations proactively. 7. Educate SAP administrators and security teams on the specifics of this vulnerability and the importance of strict permission management within SAP kernels.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2024-01-29T05:13:46.617Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd75a9

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 12:42:39 AM

Last updated: 8/8/2025, 8:48:38 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats