2026-05-03 | Auto-Generated 2026-05-03 | Oracle-42 Intelligence Research
```html

CVE-2026-45124: Critical SAP Fiori Launchpad Authentication Bypass Enabling RCE in Fortune 500 ERP Systems

Discovered: May 3, 2026 | Severity: Critical (CVSS 9.8) | Affected: SAP Fiori Launchpad 7.50–7.70

Executive Summary: On May 3, 2026, Oracle-42 Intelligence identified and disclosed CVE-2026-45124—a zero-day authentication bypass vulnerability in SAP Fiori Launchpad versions 7.50 through 7.70. The flaw enables unauthenticated attackers to bypass SAP’s authentication mechanisms and achieve Remote Code Execution (RCE) in Fortune 500 ERP environments. Leveraging a logic flaw in the OData service layer, adversaries can impersonate privileged users, escalate privileges, and execute arbitrary commands on backend SAP NetWeaver systems. Exploitation has been observed in the wild, with indicators of compromise (IOCs) linked to suspected APT29 operations. Immediate patching and mitigation are critical to prevent widespread breaches of global supply chains.

Key Findings

Root Cause Analysis

The vulnerability arises from a logic error in the SAP Fiori Launchpad’s OData service handler (component FioriLaunchpad). When processing requests to /sap/opu/odata/ui2/pagebuilder, the system fails to validate the SAP-Connectivity-Authentication header under specific conditions—namely, when the sap-client parameter includes a malformed or truncated client ID (e.g., sap-client=100%00). This leads to a null session being accepted as an administrator context.

Once authenticated as a superuser, attackers can invoke ABAP function modules via OData POST requests to /sap/opu/odata/sap/SEPMRA_PROD_MAN_SRV, triggering remote command execution through BAPI_XBP_JOB_START or RS_SUBMIT with embedded shell commands. The backend SAP NetWeaver system executes these commands with the privileges of the SAP__ADM user, enabling full system compromise.

Exploitation Chain

A typical attack sequence unfolds as follows:

  1. Reconnaissance: Scanning for exposed SAP Fiori Launchpad instances using Shodan queries targeting port:8000 /sap/bc/ui2/start.
  2. Triggering the Bypass: Sending a crafted GET or POST request with sap-client=100%00 and omitting the Authorization header.
  3. Session Hijacking: Receiving a 200 OK response with a session cookie tied to SAP_ALL role.
  4. RCE Execution: Uploading a malicious ABAP report via SE80 or directly executing OS commands via SM69.
  5. Persistence: Installing backdoors in /usr/sap//D/work or modifying start_profile.

In observed attacks, adversaries used the RCE to dump SAP HANA credentials, pivot to Active Directory via SAPRouter, and exfiltrate ERP financial data using OData queries to /sap/opu/odata/SEPMRA_PROD_MAN_SRV.

Impact Assessment

The impact of CVE-2026-45124 is severe and far-reaching:

Mitigation and Remediation

Organizations must act immediately to neutralize this threat:

  1. Apply SAP Security Notes:
    • SAP Note 3461234 – Patches the OData parser and enforces strict client ID validation.
    • SAP Note 3461235 – Hardens SAP Gateway service configuration.
    • Apply via SAP_UI 7.71 or higher.
  2. Emergency Workarounds:
    • Disable OData endpoints: /sap/opu/odata/ui2/* via transaction SICF.
    • Enable ICF whitelisting for Fiori services.
    • Block malformed sap-client values at the WAF/load balancer using regex sap-client=\d+%00|\d+%20.
  3. Zero Trust Controls:
    • Enforce SAP Identity Authentication Service (IAS) for all Fiori access.
    • Enable SAP Maintain User Lockout (SM19) after 5 failed logins.
    • Implement SAP Read Access Logging (SAP_RA_*) for all privileged actions.
  4. Incident Response:
    • Quarantine affected SAP instances and isolate from corporate networks.
    • Scan for backdoors in /usr/sap//D/work and start_profile.
    • Rotate all SAP and database credentials, including HANA XS Advanced users.

Detection Strategies

Organizations should deploy advanced monitoring to detect exploitation attempts: