SAP Mobile Platform DataVault Predictable Encryption Password

2015.08.13
Credit: Fernando Russ
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-321

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Onapsis Security Advisory 2015-012: SAP Mobile Platform DataVault Predictable Encryption Password for Secure Storage 1. Impact on Business - --------------------- By exploiting this vulnerability an attacker with access to a vulnerable mobile device would be able to read sensitive information, including encrypted log in credentials, stored in the device, potentially connecting to business applications and accessing or modifying business information Risk Level: High 2.Advisory Information - ----------------------- * Public Release Date: 2015-08-12 * Subscriber Notification Date: 2015-08-12 * Last Revised: 2015-08-12 * Security Advisory ID: ONAPSIS-2015-012 * Onapsis SVS ID: ONAPSIS-00149 * CVE: Not Assigned * Researcher: Fernando Russ * Initial Base CVSS v2: 4.7 (AV:L/AC:M/Au:N/C:C/I:N/A:N) 3. Vulnerability Information - ---------------------------- * Vendor: SAP AG * Affected Components: * SAP Mobile Platform 3.0 SP05 ClientHub * Vulnerability Class: Use of Hard-coded Cryptographic Key (CWE-321) * Remotely Exploitable: No * Locally Exploitable: Yes * Authentication Required: No * Original Advisory: http://www.onapsis.com/research/security-advisories/ 4.Affected Components Description - ---------------------------------- The SAP Mobile Platform 3.0 SP5 has an API called DataVault, which is used to securely store data on mobile devices. As described by SAP AG "[...] The DataVault APIs provide a secure way to persist and encrypt data on the device. The data vault uses AES-256 symmetric encryption of all its contents. The AES key is computed as a hash of the passcode provided and a ?salt? value that can be supplied by the device application developer, or automatically generated through the API [...]" 5.Vulnerability Details - ------------------------ The SAP DataVault has a special mechanism to generate a default set of credentials if no password/salt is supplied during the creation of the secure storage. In this mode of operation the password/salt is derived from a combination of fixed values and the VaultID belonging to the secure storage. 6.Solution - ----------- Implement SAP Security Note 2094830. 7. Report Timeline * 11/07/2014: Onapsis provides vulnerability information to SAP AG. * 11/08/2014: SAP AG confirms having received the information. * 04/08/2015: SAP AG releases SAP security note 2094830 fixing the vulnerability * 08/12/2015: Security Advisory is released. About Onapsis Research Labs - --------------------------- Onapsis Research Labs provides the industry analysis of key security issues that impact business-critical systems and applications. Delivering frequent and timely security and compliance advisories with associated risk levels, Onapsis Research Labs combine in-depth knowledge and experience to deliver technical and business-context with sound security judgment to the broader information security community. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) Comment: Onapsis Research Team iEYEARECAAYFAlXLXZ8ACgkQz3i6WNVBcDXUkACeKV+76wa7IHncrIHFu9GhtJgu 9kYAoLOQN6rGuTkqA4s/ReBA/Uggt6bC =hiVs -----END PGP SIGNATURE-----

Referencje:

http://www.onapsis.com/research/security-advisories/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top