Security News > 2019 > May > 50,000 companies running SAP installations open to attack via publicly released exploits

Two exploits publicly released in late April at the OPCDE security conference in Dubai could be leveraged to compromise a great number of SAP implementations, Onapsis has warned. A successful attack would allow remote, unauthenticated attackers to: Perform critical business transaction on SAP systems (modify purchase orders, bypassing automatic business controls, etc.) Compromise and extract critical business information Delete all business application data Delete traces of their actions Shut the system down. “This risk to … More → The post 50,000 companies running SAP installations open to attack via publicly released exploits appeared first on Help Net Security.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/fYnRrkiNc7c/
Related news
- China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil (source)
- SAP fixes critical Netweaver flaw exploited in attacks (source)
- SAP fixes suspected Netweaver zero-day exploited in attacks (source)
- Craft CMS RCE exploit chain used in zero-day attacks to steal data (source)
- ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More (source)
- How cybercriminals exploit psychological triggers in social engineering attacks (source)
- Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell (source)
- Chinese hackers behind attacks targeting SAP NetWeaver servers (source)
- China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide (source)
- SAP patches second zero-day flaw exploited in recent attacks (source)