SAP AI Vulnerabilities Expose Critical Cloud Weaknesses

BY Mark Howell 18 July 20244 MINS READ
article cover

Today in Edworking News we want to talk about SAPwned: SAP AI vulnerabilities expose customers’ cloud environments and private AI artifacts. Wiz Research uncovers vulnerabilities in SAP AI Core, allowing malicious actors to take over the service and access customer data.

Executive Summary

Over the past few months, the Wiz Research Team delved deeply into tenant isolation within multiple AI service providers, discovering vulnerabilities in SAP AI Core. These vulnerabilities enable malicious actors to commandeer the service, gaining access to customer data and spreading to related environments. As AI infrastructures become ubiquitous in business environments, understanding these vulnerabilities is crucial for maintaining security. The research, dubbed "SAPwned," exposes how attackers could exploit these vulnerabilities and highlights the necessity for improved isolation and sandboxing standards when running AI models.

Image of SAP AI Core Network Setup

Description: Diagram illustrating the network setup of SAP AI Core

Introduction: The Research Begins

SAP AI Core is designed to let users develop, train, and run AI services utilizing SAP's cloud resources. However, running customer code in a shared environment is risky. Our research kicked off by exploiting basic permissions as an SAP customer to create AI projects. We used an Argo Workflow file to spawn a Kubernetes Pod, running our code within the Pod, bypassing the network restrictions enforced by an Istio proxy sidecar.

Bug #1: Bypassing Network Restrictions

Despite protections from an admission controller, we found configurations that were not blocked. Using the `shareProcessNamespace` and `runAsUser` configurations, we accessed Istio’s configuration, gaining an access token to the cluster's centralized Istiod server. This granted us network access, which we exploited to scan the Pod's internal network.

Bug #2: Loki Leaks AWS Tokens

An instance of Grafana Loki on the cluster exposed AWS secrets used for accessing S3, providing access to vast logs from AI Core services and customer Pods.

Bug #3: Unauthenticated EFS Shares

We discovered 6 AWS Elastic File System (EFS) instances configured publicly, allowing unauthorized access to AI data, including training datasets and code categorized by customer ID.

Bug #4: Unauthenticated Helm Server

The Helm server Tiller (version 2) was exposed without authentication, revealing secrets to SAP's Docker Registry and Artifactory server. Attackers could exploit these to read or modify internal images and cutomers' commercial secrets.

Bug #5: Full Cluster Takeover

The Helm server allowed both read and write operations, facilitating a complete cluster takeover. This exposure enabled attackers to access sensitive customer data, models, datasets, and more. Furthermore, customer secrets stored across AWS, SAP HANA, and Docker Hub were exposed and accessible.

Takeaways

Our research underscores several pivotal points:

  • The need for defense-in-depth strategies: Relying solely on perimeter defenses like Istio was insufficient once those defenses were bypassed.

  • The tenant isolation pitfalls in Kubernetes-managed services need addressing as they permit logical connections between control and data planes.

  • Guardrails are essential in AI model training to separate untrusted code from internal assets and other tenants.

Conclusion

All discovered vulnerabilities have been communicated to SAP, who promptly issued patches. Importantly, no customer data was compromised. Nonetheless, our findings stress the importance of robust, multifaceted security measures in managed AI platforms.

Description: A visual representation of AI Security Posture Management Framework

Further Engagement

  • Disclosure timeline:
    - Jan. 25, 2024 – Wiz Research reports to SAP
    - Jan. 27, 2024 – SAP responds and assigns a case number
    - Feb. 16, 2024 – SAP fixes first vulnerability and rotates relevant secrets
    - Feb. 28, 2024 – Wiz Research identifies new vulnerabilities, reports to SAP
    - May 15, 2024 – SAP deploys fixes for all reported issues
    - Jul. 17, 2024 – Public disclosure

Remember these 3 key ideas for your startup:

  1. Prioritize Isolation and Sandboxing:
    Ensure robust isolation and sandboxing standards in your AI R&D process to mitigate the risk of cross-tenant access and untrusted code execution. Check out SAP AI Core for how they address these challenges.

  2. Robust Defense-in-Depth Strategy:
    Implement multifaceted security measures, including internal service hardening to minimize potential attack vectors. For instance, leveraging Istio for network security but be aware of its limitations.

  3. Stay Informed and Proactive:
    Regularly update and patch vulnerabilities as soon as they are discovered. Engage with AI Security Posture Management tools for continuous visibility and proactive risk mitigation.
    Edworking is the best and smartest decision for SMEs and startups to be more productive. Edworking is a FREE superapp of productivity that includes all you need for work powered by AI in the same superapp, connecting Task Management, Docs, Chat, Videocall, and File Management. Save money today by not paying for Slack, Trello, Dropbox, Zoom, and Notion.
    For more details, see the original source.

article cover
About the Author: Mark Howell Linkedin

Mark Howell is a talented content writer for Edworking's blog, consistently producing high-quality articles on a daily basis. As a Sales Representative, he brings a unique perspective to his writing, providing valuable insights and actionable advice for readers in the education industry. With a keen eye for detail and a passion for sharing knowledge, Mark is an indispensable member of the Edworking team. His expertise in task management ensures that he is always on top of his assignments and meets strict deadlines. Furthermore, Mark's skills in project management enable him to collaborate effectively with colleagues, contributing to the team's overall success and growth. As a reliable and diligent professional, Mark Howell continues to elevate Edworking's blog and brand with his well-researched and engaging content.

Trendy NewsSee All Articles
CoverEdit PDFs Securely & Freely: Breeze PDF In-Browser SolutionBreeze PDF is a free, offline browser-based PDF editor ensuring privacy. It offers text, image, and signature additions, form fields, merging, page deletion, and password protection without uploads.
BY Mark Howell 1 mo ago
CoverDecoding R1: The Future of AI Reasoning ModelsR1 is an affordable, open-source AI model emphasizing reasoning, enabling innovation and efficiency, while influencing AI advancements and geopolitical dynamics.
BY Mark Howell 26 January 2025
CoverSteam Brick: A Minimalist Gaming Console Redefines PortabilitySteam Brick: A modified, screenless Steam Deck for travel, focusing on portability by using external displays and inputs. A creative yet impractical DIY project with potential risks.
BY Mark Howell 26 January 2025
CoverVisual Prompt Injections: Essential Guide for StartupsThe Beginner's Guide to Visual Prompt Injections explores vulnerabilities in AI models like GPT-4V, highlighting security risks for startups and offering strategies to mitigate potential data compromises.
BY Mark Howell 13 November 2024
CoverGraph-Based AI: Pioneering Future Innovation PathwaysGraph-based AI, developed by MIT's Markus J. Buehler, bridges unrelated fields, revealing shared complexity patterns, accelerating innovation by uncovering novel ideas and designs, fostering unprecedented growth opportunities.
BY Mark Howell 13 November 2024
CoverRevolutionary Image Protection: Watermark Anything with Localized MessagesWatermark Anything enables embedding multiple localized watermarks in images, balancing imperceptibility and robustness. It uses Python, PyTorch, and CUDA, with COCO dataset, under CC-BY-NC license.
BY Mark Howell 13 November 2024
CoverJungle Music's Role in Shaping 90s Video Game SoundtracksJungle music in the 90s revolutionized video game soundtracks, enhancing fast-paced gameplay on PlayStation and Nintendo 64, and fostering a cultural revolution through its energetic beats and immersive experiences.
BY Mark Howell 13 November 2024
CoverMastering Probability-Generating Functions: A Guide for EntrepreneursProbability-generating functions (pgfs) are mathematical tools used in probability theory for data analysis, risk management, and predictive modeling, crucial for startups and SMEs in strategic decision-making.
BY Mark Howell 31 October 2024
Try EdworkingA new way to work from  anywhere, for everyone for Free!
Sign up Now