Published Exploits for Accessing SAP Systems Put Security Teams on Alert

In April 2019, researchers Dmitry Chastuhin and Mathieu Geli presented a talk at the OPCDE Cyber Security Conference about two pieces of exploit code that, if used by attackers, can allow anyone to interact with an organization’s SAP enterprise resource planning platform and perform unauthorized transactions. With the exploits, for example, attackers could use the code to shut down an entire SAP system, execute commands on behalf of the operating system or extract valuable data.

Read full article on Security Intelligence