July 17th, 2024

SAPwned: SAP AI vulnerabilities expose customers' cloud environments and privat

The Wiz Research Team identified vulnerabilities in SAP AI Core, enabling unauthorized access to customer data. Reported issues included network bypass, AWS token leaks, and exposure of sensitive information. SAP addressed and resolved all vulnerabilities.

Read original articleLink Icon
SecurityCriticismConcern
SAPwned: SAP AI vulnerabilities expose customers' cloud environments and privat

The Wiz Research Team discovered vulnerabilities in SAP AI Core that could allow malicious actors to compromise the service and access customer data. By exploiting these vulnerabilities, attackers could gain access to customers' private files, cloud credentials, and internal artifacts. The vulnerabilities found in SAP AI Core included issues such as bypassing network restrictions, leaking AWS tokens, exposing user files through unauthenticated EFS shares, compromising internal Docker Registry and Artifactory, and exposing Google access tokens and customer secrets through an unauthenticated Helm server. These vulnerabilities could have led to unauthorized access to sensitive data, manipulation of AI models, and potential supply-chain attacks. The research highlights the importance of improving isolation and sandboxing standards in AI infrastructure to prevent such security breaches. All vulnerabilities were reported to SAP and have been fixed. No customer data was compromised during the research.

Related

'Skeleton Key' attack unlocks the worst of AI, says Microsoft

'Skeleton Key' attack unlocks the worst of AI, says Microsoft

Microsoft warns of "Skeleton Key" attack exploiting AI models to generate harmful content. Mark Russinovich stresses the need for model-makers to address vulnerabilities. Advanced attacks like BEAST pose significant risks. Microsoft introduces AI security tools.

A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too

A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too

A hacker breached OpenAI's internal messaging systems, accessing A.I. technology details but not code. The incident raised concerns about foreign theft. OpenAI responded by enhancing security measures and exploring regulatory frameworks.

A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too

A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too

A hacker breached OpenAI's internal messaging systems, accessing A.I. technology details but not code. Concerns over national security risks arose, leading to internal security debates and calls for tighter controls on A.I. labs.

A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too

A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too

A hacker breached OpenAI's internal messaging systems, accessing discussions on A.I. tech. No code was compromised. The incident sparked internal debates on security and A.I. risks amid global competition.

OpenAI was hacked year-old breach wasn't reported to the public

OpenAI was hacked year-old breach wasn't reported to the public

Hackers breached OpenAI's internal messaging systems, exposing AI technology details, raising national security concerns. OpenAI enhanced security measures, dismissed a manager, and established a Safety and Security Committee to address the breach.

AI: What people are saying
The article on SAP AI Core vulnerabilities has sparked a range of discussions.
  • Some commenters emphasize that the vulnerabilities are due to poor cloud computing platform security, not the AI product itself.
  • There are concerns about the ethics of companies like Wiz conducting unauthorized network penetration to find vulnerabilities.
  • Commenters are surprised by outdated software configurations, such as the presence of deprecated Tiller instances.
  • Questions are raised about SAP's internal security measures and alert systems, suggesting a need for better monitoring and response.
  • Some see the incident as a promotional opportunity for SAP's AI products, despite the security flaws.
Link Icon 12 comments
By @jaaron - 4 months
While I get that it's the AI product, the vulnerability here is the k8s configuration. It really has nothing to do with the AI product itself or AI training or anything related to machine learning or generative AI, it's more about poor cloud computing platform security.
By @dotty- - 4 months
I hope SAP does a hard retrospective on why Wiz's research was not disrupted before they got full cluster admin. Like, I want to know from SAP's side whether they received any alerts for any of this activity and whether they investigated them properly. I wonder if there is any regulation SAP has to follow that requires them to have adequate alerting for suspicious network activity and whether this research can be used to show that they do not.
By @mac-chaffee - 4 months
Shocked that there was a tiller instance running. That's been deprecated since 2020: https://helm.sh/blog/helm-v2-deprecation-timeline/
By @ec109685 - 4 months
This is really bad. They are running a single K8s cluster and expecting hard multi-tenancy guarantees?

All the major clouds use vm boundaries and separate K8s clusters between customers. Microsoft was similarly bitten a few years ago with one of their function products that expected K8s to be the primary security boundary.

By @darefalcon - 4 months
Companies that penetrate networks uninvited looking for vulnerabilities to create blog content should be prosecuted IMHO. This piece in particular sounds like a hit piece thinly vailed as a vulnerability disclosure.

“We thanked them for their co-operation”. Sounds kinda like extortion.

By @tiffanyh - 4 months
Has anyone used Wiz?

It's possibly the fastest rocket for an enterprise software company ever.

$100M in just 1.5 years time

$350M at end of 3-year

https://www.wiz.io/blog/100m-arr-in-18-months-wiz-becomes-th...

By @tetha - 4 months
This makes me glad I finally talked people at work into running our annual pentests of our products on production, and putting the entire production infrastructure in scope. Focus may be on a specific product or system, but everything is in scope.

And the first test is running, and no one is screaming yet, so fingers crossed.

By @betaby - 4 months
Am I reading it correctly, customer's account data is exposed to the same customer? The exception is some logs as I see.
By @cosmotic - 4 months
As security researchers, you think they might have known that pixelating text to redact it is a poor choice.

https://www.bleepingcomputer.com/news/security/researcher-re...

By @1oooqooq - 4 months
the sad part is that all this is going to accomplish is promote that sap has ai product their clients can purchase. it's not like anyone using sap know or care about security other than signing with a company that has all the ISO and whatnot, which is the reason they went with sap to begin with
By @mvandermeulen - 4 months
Excellent write up. This wasn’t a sophisticated attack. Seems like there is very little discipline at Salesforce when it comes to deploying production systems.