INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global apt Multiple sectors HIGH 51m Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 1h Global ddos Technology and Social Media HIGH 1h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 3h Global general Software/Technology LOW 3h Global malware Energy CRITICAL 4h Global apt Multiple sectors HIGH 51m Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 1h Global ddos Technology and Social Media HIGH 1h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 3h Global general Software/Technology LOW 3h Global malware Energy CRITICAL 4h Global apt Multiple sectors HIGH 51m Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 1h Global ddos Technology and Social Media HIGH 1h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 3h Global general Software/Technology LOW 3h Global malware Energy CRITICAL 4h
Vulnerabilities

CVE-2016-2388

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
SAP NetWeaver Information Disclosure Vulnerability — The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP r
Published: Jun 9, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

SAP NetWeaver Information Disclosure Vulnerability — The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request.

🤖 AI Executive Summary

CVE-2016-2388 is a critical information disclosure vulnerability in SAP NetWeaver AS JAVA 7.4's Universal Worklist Configuration that allows remote unauthenticated attackers to obtain sensitive user information via crafted HTTP requests. This vulnerability has known public exploits available, including Metasploit modules, making it trivially exploitable. Despite being disclosed in 2016, unpatched SAP systems remain common in enterprise environments, and this vulnerability continues to be actively targeted by threat actors seeking to enumerate SAP users for further attacks.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 5, 2026 10:49
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses severe risk to Saudi organizations given the extensive SAP deployment across critical sectors. Banking institutions regulated by SAMA heavily rely on SAP for core financial operations. Saudi Aramco and other energy sector companies use SAP extensively for ERP operations. Government entities under NCA oversight, including ministries and public sector organizations, commonly deploy SAP NetWeaver. Telecom operators like STC and healthcare organizations also use SAP systems. Successful exploitation could expose employee directories, usernames, email addresses, and organizational structures — information that enables targeted spear-phishing campaigns and further SAP system compromise. The availability of public exploits significantly increases the likelihood of opportunistic attacks against Saudi infrastructure.
🏢 Affected Saudi Sectors
Banking Government Energy Telecommunications Healthcare Retail Manufacturing
⚖️ Saudi Risk Score (AI)
8.5
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Apply SAP Security Note 2256846 immediately to all affected SAP NetWeaver AS JAVA 7.4 systems
2. Restrict external access to the Universal Worklist Configuration endpoint (/webdynpro/dispatcher/sap.com/tc~wd~tools/)
3. Implement network segmentation to prevent direct internet access to SAP application servers

Detection:
4. Monitor HTTP access logs for requests to /webdynpro/dispatcher/sap.com/tc~wd~tools/ from unauthorized sources
5. Deploy WAF rules to block crafted requests targeting the Universal Worklist Configuration
6. Search for indicators of prior exploitation in historical logs

Compensating Controls:
7. If immediate patching is not possible, disable the Universal Worklist Configuration service
8. Implement IP whitelisting for SAP management interfaces
9. Enable SAP Security Audit Log (SM20) for monitoring unauthorized access attempts
10. Conduct a full SAP user enumeration audit to identify any accounts that may have been compromised
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تطبيق ملاحظة أمان SAP رقم 2256846 فوراً على جميع أنظمة SAP NetWeaver AS JAVA 7.4 المتأثرة
2. تقييد الوصول الخارجي إلى نقطة نهاية تكوين قائمة العمل العالمية
3. تنفيذ تجزئة الشبكة لمنع الوصول المباشر من الإنترنت إلى خوادم تطبيقات SAP

الكشف:
4. مراقبة سجلات الوصول HTTP للطلبات الموجهة إلى مسار Universal Worklist من مصادر غير مصرح بها
5. نشر قواعد جدار حماية تطبيقات الويب لحظر الطلبات المُعدّة
6. البحث عن مؤشرات الاستغلال السابق في السجلات التاريخية

الضوابط التعويضية:
7. في حالة عدم إمكانية التحديث الفوري، قم بتعطيل خدمة تكوين قائمة العمل العالمية
8. تنفيذ قوائم بيضاء لعناوين IP لواجهات إدارة SAP
9. تفعيل سجل تدقيق أمان SAP (SM20) لمراقبة محاولات الوصول غير المصرح بها
10. إجراء تدقيق كامل لتعداد مستخدمي SAP لتحديد أي حسابات قد تكون تعرضت للاختراق
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
2-3-1 (Vulnerability Management) 2-5-1 (Network Security) 2-2-1 (Information System Asset Management) 2-6-1 (Application Security)
🔵 SAMA CSF
3.3.3 (Vulnerability Management) 3.3.4 (Patch Management) 3.1.3 (Information Asset Management) 3.3.7 (Network Security Management)
🟡 ISO 27001:2022
A.8.8 (Management of Technical Vulnerabilities) A.8.9 (Configuration Management) A.8.20 (Networks Security) A.5.7 (Threat Intelligence)
🟣 PCI DSS v4.0
6.3.3 (Patching Security Vulnerabilities) 6.4.1 (Public-Facing Web Application Protection) 11.3 (Penetration Testing) 7.1 (Restrict Access to System Components)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
SAP:NetWeaver
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS62.29%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-06-30
Published 2022-06-09
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.