Security Advisories

Die Onapsis Research Labs veröffentlichen regelmäßig Forschungsberichte zu den neuesten SAP®- und Oracle®-Schwachstellen und stellen diese unserem Öko-System aus Kunden, Partnern und IT-Sicherheitsanbietern zur Verfügung. 

Mit unseren Security Advisories können Kunden die Sicherheits- und Geschäftsrisiken besser abschätzen, die von den jüngsten Schwachstellen in SAP®- und Oracle®-Anwendungen ausgehen. Sie können damit festlegen, in welcher Reihenfolge Patches, Updates und Reparaturmaßnahmen durchzuführen sind, um die Kontinuität des Geschäftsbetriebs zu sichern. Die Security Advisories von Onapsis – einschließlich Hersteller-Patches und -Sicherheitshinweisen – stehen für Sie zum Download bereit. So werden Anbieter und Endnutzer mit den notwendigen Informationen versorgt, um die steigenden Bedrohungen für die geschäftskritischen SAP®- und Oracle®-Anwendungen zu reduzieren. 

High 03/19/2021 SAP

SAP Multiple root LPE through SAP Host Control

Impact On Business

A malicious authenticated attacker, with privileges of SAP SMD Agent access, could abuse some SAP Host Control functions' lack of sanitization, in order to escalate its privileges and execute commands as root/system user.


Affected Components Description

The SAP Host Agent is an agent which allows controlling and monitoring SAP and non-SAP instances.

Affected components:

  • SAPHOSTAGENT 7.21 SP045 and lower

(Check SAP Note #2902645 for detailed information on affected releases)


Vulnerability Details

Some processes part of the SAP Host Agent run as root. This product is usually installed automatically when a new SAP system is installed. In order to expose its functionalities, the SAP Host Agent provides a SOAP interface, on ports 1128 or 1129 (TLS). Every function exposed by this service requires high privileges.

If an attacker gets privileges of SAP SMD Agent OS user , it will be able to interact with the Host Agents’ exposed SOAP interface, allowing them to execute any functionality. Because of a lack of sanitization of certain parameters,  several exposed functions were vulnerable to OS command injection.  As some of these functions are executed with root/system privileges, it is possible to perform a local privilege escalation from SAP SMD Agent user to root/system.



SAP has released SAP Note #2902645 which provides patched versions of the affected components.

The patches can be downloaded from:

Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks.


Report Timeline

  • 12/09/2019: Onapsis provides details to SAP
  • 01/12/2020: SAP provides update: "Vulnerability in progress".
  • 02/10/2020: SAP provides update: "Vulnerability in progress".
  • 03/09/2020: SAP Provides update: "Vulnerability In progress".
  • 04/13/2020: SAP releases SAP Security note addressing the issue.




  • Public Release Date: 03/19/2021

  • Security Advisory ID: ONAPSIS-2021-0002

  • Vulnerability Submission ID: 802, 803, 804.

  • Researcher(s): Pablo Artuso, Yvan Genuer



  • Vendor: SAP
  • Vulnerability Class: |LS|CWE-78|RS| Improper Neutralization of Special Elements in an OS Command
  • CVSS v3 score: 7.2 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
  • Severity:  High
  • CVE:  CVE-2020-6234
  • Vendor patch Information: SAP Security Note #2902645



Onapsis Research Labs provides the industry analysis of key security issues that impact mission-critical systems and applications.

Delivering frequent and timely security and compliance advisories with associated risk levels, Onapsis Research Labs combine in-depth knowledge and experience to deliver technical and business-context with sound security judgment to the broader information security community.

Find all reported vulnerabilities at



This advisory is licensed under a Creative Commons 4.0 BY-ND International License