Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » SAP AI Core vulnerabilities expose customer data to cyber attacks
Global Security

SAP AI Core vulnerabilities expose customer data to cyber attacks

AdminBy AdminJuly 18, 2024No Comments3 Mins Read
SAP AI Core Vulnerabilities
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 18, 2024Information hallCloud Security / Enterprise Security

SAP AI Core Vulnerabilities

Cybersecurity researchers have discovered security flaws in the The core of SAP AI a cloud-based platform for building and deploying artificial intelligence (AI) workflows that can be used to generate access tokens and customer data.

Five vulnerabilities were named together SAPwned from cloud security company Wiz.

“The vulnerabilities we discovered could have allowed attackers to access customer data and contaminate internal artifacts by spreading to related services and other customers’ environments,” security researcher Hilai Ben-Sasson said in a report shared with The Hacker News.

After responsible disclosure on January 25, 2024, SAP remedied the deficiencies as of May 15, 2024.

Cyber ​​security

In a nutshell, the vulnerabilities allow unauthorized access to private artifacts and customer credentials in cloud environments such as Amazon Web Services (AWS), Microsoft Azure, and SAP HANA Cloud.

They can also be used to modify Docker images in SAP’s internal container registry, SAP’s Docker images in Google’s container registry, and artifacts hosted on SAP’s internal Artifactory server, leading to a supply chain attack on SAP AI Core services.

In addition, the access could be used to gain cluster administrator privileges on a Kubernetes cluster from SAP AI Core by exploiting the fact that the Helm package manager server was exposed to both read and write operations.

“Using this level of access, an attacker could gain direct access to other customers’ Pods and steal sensitive data such as models, datasets, and code,” Ben-Sasson explained. “This access also allows attackers to tamper with customer Pods, corrupt AI data, and manipulate model output.”

Wiz said the problems arise because the platform makes it possible to run malicious AI models and training routines without proper isolation and sandboxing mechanisms.

As a result, a threat actor could build a normal AI application on SAP AI Core, bypass network restrictions and probe the Kubernetes Pod’s internal network to obtain AWS tokens and access client code and training datasets using misconfigurations in the AWS Elastic File System (EFS). ) shares.

“Training AI by definition requires running arbitrary code; therefore, appropriate fences must be installed to ensure that untrusted code is properly separated from internal assets and other tenants,” Ben-Sasson said.

The findings come after Netskope revealed that the growing use of generative artificial intelligence in enterprises has pushed organizations to use lockout controls, data loss prevention (DLP) tools, real-time coaching and other mechanisms to reduce risk.

“Regulated data (data that organizations are required to protect by law) accounts for more than a third of sensitive data transferred to generative artificial intelligence (genAI) programs, putting businesses at potential risk of costly data breaches,” the company said in a statement. said.

They are also monitoring the emergence of a new cybercriminal threat group called NullBulge, which has targeted AI and gaming-focused organizations since April 2024 to steal sensitive data and sell compromised OpenAI API keys on underground forums, saying is a hacktivist group that “protects artists around the world” from artificial intelligence.

“NullBulge targets the software supply chain by weaponizing code in public repositories on GitHub and Hugging Face, forcing victims to import malicious libraries or via modpacks used in games and simulation software,” Jim Walter, SentinelOne security researcher. said.

“The group uses tools like AsyncRAT and XWorm before delivering LockBit payloads created using the leak LockBit Black builder. Groups like NullBulge present a constant threat of ransomware with a low barrier to penetration combined with the evergreen effect of hijacker infections.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.