• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

SAP lacks security check for its HANA Database Management

By Guest Authors

When you are in the business of handling the critical enterprise applications of large public companies, any instance of security vulnerabilities should make you respond to it quickly. Quite the contrary for SAP.

Onapsis’ security researchers uncovered more than a dozen of security flaws in the SAP HANA in-memory database management platform services that process applications for businesses. The good news, though, is that SAP has already patched these vulnerabilities and issued guidance for configuration issues found in the platform.

sap-hana

However, Onapsis lamented that SAP failed to pay mind to these vulnerabilities that grew in number over the past year as made manifest by various reports about affected business applications. SAP HANA powers the tools that the Fortune 2000 companies use to manage scientific data and critical assets.

In other words, the critical issues in SAP HANA lack the attention needed to address them. Onapsis said there had been a lot of security measures missing in place and that even the people and teams who should pay attention to these issues did not have sufficient concern for the vulnerabilities long discovered to affect this platform.

Chances are that if these tools are left unattended because of the wide distribution of duties, cyber criminals and state-sponsored hackers will find a way to hack into these systems for a variety of purposes.

More specifically, some of the critical security flaws involve the TrexNet administrative interface found in SAP HANA installation that is responsible for granting execution approval for various business operations. Because of the default configuration in the interfaces, some business functions are potentially exposed to remotely executed attacks.

The problem is addressed through a new configuration. If these functions are exposed, attackers will be able to gain a full view of a company’s enterprise data and manipulate it for their own gains.

Onapsis advises users who would be installing SAP HANA for the first time to configure the parameters in order to close the interfaces, which are open by default. Also, the communication for several servers must be conducted on a private network.

Fortunately for SAP HANA clients, several memory corruption and SQL-based flaws have been fixed already, consequently preventing a remote code execution and denial-of-service attacks from taking place. Also, there has been no known exploits in the wild as of this time, so everyone using the platform is relatively safe at the very least.

While the critical vulnerabilities have been patched, the security researchers vow to carry on with their study of the applications to find, if ever, more flaws in order to address them.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Seedpace Interactive Player with Craft Review: A Screen-Free Storytelling Experience

Audioengine HD4 Next Gen Review – The Perfect Bookshelf Speakers for Your Computer Setup

Keychron K6 HE Wireless Magnetic Switch Keyboard (Special Edition) Review

Kodak Luma 500 Review – An Impressive Mini Projector with Native 1080p Resolution

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • Seedpace Interactive Player with Craft Review: A Screen-Free Storytelling Experience
  • Audioengine HD4 Next Gen Review – The Perfect Bookshelf Speakers for Your Computer Setup
  • Mureka AI Launches V7.5 Model with Revolutionary Music Quality and Creativity Enhancement
  • OpenRock Link 20 Review: Comfort and Clarity in an Open-Ear Design

Copyright © 2025 · All Rights Reserved