Denial of service in ckass CL_APC_WS_EXT_PERFORMANCE_TEST
Impact on Business
By exploiting this vulnerability, an attacker, authenticated as a non-administrative user, has the ability to significantly degrade the service quality experienced by legitimate users. These attacks introduce large response delays, excessive losses, and service interruptions, resulting in direct impact on availability.
Vulnerability Details
An attacker, authenticated as non-administrative user on the SAP system, can trigger a condition that would exhaust resources and lead to a denial of service condition, if the ICF service sap/bc/icf/performance_tst is enabled. Triggering multiple of these requests with certain parameters, even alternating the channel_id, would lock work processes denying service to other application users.
Solution
SAP has released SAP Note 3296378 which provides patched versions of the affected components.
The patches can be downloaded from https://me.sap.com/notes/3296378
Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks.
Report Timeline
- 01/25/2023: Onapsis reports vulnerability to SAP
- 04/11/2023: SAP issues the patch
References
- Onapsis blogpost: https://onapsis.com/blog/sap-patch-day-april-2023/
- CVE Mitre: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28763
- Vendor Patch: https://me.sap.com/notes/3296378
Advisory Information
- Public Release Date: 09/02/2025
- Security Advisory ID: ONAPSIS-2024-0052
- Researcher(s): Juan Pablo Perez Etchegoyen
Vulnerability Information
- Vendor: SAP
- Affected Components:
- SAP NetWeaver AS ABAP and ABAP Platform
- SAP BASIS
(Check SAP Note 3296378 for detailed information on affected releases)
- Vulnerability Class: CWE-400: Uncontrolled Resource Consumption
- CVSS v3 score: 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
- Risk Level: Medium
- Assigned CVE: CVE-2023-28763
- Vendor patch Information: SAP Security NOTE 3296378
Affected Components Description
- SAP_BASIS 740 SP 09-29
- SAP_BASIS 750 SP 26
- SAP_BASIS 751 SP 16
- SAP_BASIS 752 SP 12
- SAP_BASIS 753 SP 10
- SAP_BASIS 754 SP 07
- SAP_BASIS 755 SP 05
- SAP_BASIS 756 SP 03
- SAP_BASIS 757 SP 01
About our Research Labs
Onapsis Research Labs provides the industry analysis of key security issues that impact mission-critical systems and applications.
Delivering frequent and timely security and compliance advisories with associated risk levels, Onapsis Research Labs combine in-depth knowledge and experience to deliver technical and business-context with sound security judgment to the broader information security community.
Find all reported vulnerabilities at:
https://github.com/Onapsis/vulnerability_advisories
This advisory is licensed under a Creative Commons 4.0 BY-ND International License