INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h
Vulnerabilities

CVE-2018-2380

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
SAP Customer Relationship Management (CRM) Path Traversal Vulnerability — SAP Customer Relationship Management (CRM) contains a path traversal vulnerability that allows an attacker to exploit insuffic
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

SAP Customer Relationship Management (CRM) Path Traversal Vulnerability — SAP Customer Relationship Management (CRM) contains a path traversal vulnerability that allows an attacker to exploit insufficient validation of path information provided by users.

🤖 AI Executive Summary

CVE-2018-2380 is a critical path traversal vulnerability in SAP Customer Relationship Management (CRM) with a CVSS score of 9.0. The vulnerability allows attackers to exploit insufficient validation of user-supplied path information, potentially enabling unauthorized file access, data exfiltration, or remote code execution. This vulnerability is actively exploited in the wild and has been added to CISA's Known Exploited Vulnerabilities catalog, making immediate patching essential for all affected organizations.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 11, 2026 00:20
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses a severe risk to Saudi organizations heavily reliant on SAP CRM systems. The banking sector (regulated by SAMA) extensively uses SAP CRM for customer management and financial operations. Government entities under NCA oversight, ARAMCO and energy sector companies, and major telecom providers like STC all utilize SAP CRM platforms. Successful exploitation could lead to unauthorized access to sensitive customer data, financial records, and critical business information. Given Saudi Arabia's Vision 2030 digital transformation initiatives and the widespread SAP deployment across Saudi enterprises, this vulnerability represents a significant threat to national digital infrastructure.
🏢 Affected Saudi Sectors
Banking Government Energy Telecommunications Retail Healthcare Manufacturing
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Apply SAP Security Note 2547431 immediately to patch the path traversal vulnerability
2. Verify all SAP CRM instances are identified in your asset inventory
3. Review web server and application logs for signs of path traversal exploitation (e.g., '../' sequences in HTTP requests)

PATCHING GUIDANCE:
1. Download and apply the latest SAP security patch from SAP Support Portal
2. Test the patch in a non-production environment before deploying to production
3. Schedule emergency maintenance window if not already patched

COMPENSATING CONTROLS (if immediate patching is not possible):
1. Implement Web Application Firewall (WAF) rules to block path traversal patterns
2. Restrict network access to SAP CRM systems to trusted IP ranges only
3. Enable enhanced logging and monitoring on SAP CRM application servers
4. Implement input validation at the network perimeter level

DETECTION RULES:
1. Monitor for '../', '..\', '%2e%2e' patterns in HTTP requests to SAP CRM
2. Alert on unusual file access patterns from SAP CRM application accounts
3. Monitor for unauthorized file reads outside the SAP CRM web root directory
4. Implement SIEM correlation rules for SAP CRM exploitation indicators
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تطبيق ملاحظة أمان SAP رقم 2547431 فوراً لتصحيح ثغرة اجتياز المسار
2. التحقق من تحديد جميع مثيلات SAP CRM في سجل الأصول
3. مراجعة سجلات خادم الويب والتطبيقات بحثاً عن علامات استغلال اجتياز المسار

إرشادات التصحيح:
1. تنزيل وتطبيق أحدث تصحيح أمني من بوابة دعم SAP
2. اختبار التصحيح في بيئة غير إنتاجية قبل النشر في الإنتاج
3. جدولة نافذة صيانة طارئة إذا لم يتم التصحيح بعد

الضوابط التعويضية (في حال عدم إمكانية التصحيح الفوري):
1. تنفيذ قواعد جدار حماية تطبيقات الويب لحظر أنماط اجتياز المسار
2. تقييد الوصول الشبكي لأنظمة SAP CRM على نطاقات IP الموثوقة فقط
3. تفعيل التسجيل والمراقبة المحسنة على خوادم تطبيقات SAP CRM
4. تنفيذ التحقق من المدخلات على مستوى محيط الشبكة

قواعد الكشف:
1. مراقبة أنماط '../' و '..\ ' و '%2e%2e' في طلبات HTTP إلى SAP CRM
2. التنبيه عند أنماط الوصول غير العادية للملفات من حسابات تطبيق SAP CRM
3. مراقبة قراءات الملفات غير المصرح بها خارج دليل جذر الويب لـ SAP CRM
4. تنفيذ قواعد ارتباط SIEM لمؤشرات استغلال SAP CRM
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2-3-1 (Vulnerability Management) ECC-2-5-1 (Security Patch Management) ECC-2-2-1 (Asset Management) ECC-2-7-1 (Security Monitoring and Event Management)
🔵 SAMA CSF
3.3.3 (Vulnerability Management) 3.3.4 (Patch Management) 3.3.7 (Web Application Security) 3.4.1 (Security Event Logging and Monitoring)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.9 (Configuration management) A.8.16 (Monitoring activities) A.8.28 (Secure coding)
🟣 PCI DSS v4.0
6.3.3 (Patching security vulnerabilities) 6.4 (Web application security) 11.3 (Penetration testing) 10.6 (Review logs and security events)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
SAP:Customer Relationship Management (CRM)
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS45.53%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-05-03
Published 2021-11-03
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.