Researchers at cybersecurity firm Rapid7 have uncovered several vulnerabilities in the Sage X3 enterprise resource planning (ERP) product, including flaws that can be exploited remotely without authentication to take complete control of a system.
Of the four vulnerabilities identified by the researchers, one has been rated critical and the rest are medium severity. The critical flaw, tracked as CVE-2020-7388, has been described as an unauthenticated remote command execution issue.
The vulnerability is related to a remote administration service and it can be exploited using specially crafted requests to execute commands with elevated privileges.
A piece of information required to exploit this flaw can be obtained by leveraging one of the medium-severity vulnerabilities, specifically CVE-2020-7387, which is an installation pathname disclosure issue.
“When combining CVE-2020-7387 and CVE-2020-7388, an attacker can first learn the installation path of the affected software, then use that information to pass commands to the host system to be run in the SYSTEM context,” Rapid7 explained in a blog post. “This can allow an attacker to run arbitrary operating system commands to create Administrator level users, install malicious software, and otherwise take complete control of the system for any purpose.”
The two remaining flaws have been described as authenticated OS command injection and persistent cross-site scripting (XSS) issues.
The security holes were reported to the vendor in February 2021 and they were patched the next month. Customers were privately notified about the availability of patches in May.
Patched versions include Sage X3 Version 9 (Syracuse 9.22.7.2), Sage X3 HR & Payroll Version 9 (Syracuse 9.24.1.3), Sage X3 Version 11 (Syracuse 11.25.2.6), and Sage X3 Version 12 (Syracuse 12.10.2.8).
Thousands of medium and large organizations around the world use Sage X3. Rapid7 cautioned that the product should not be exposed directly to the internet — a secure VPN connection should be used for remote access. However, a search for Sage X3 on the Censys search engine returns more than 1,800 results.
Related: Internet Scanned for SAP Systems Affected by RECON Vulnerability
Related: Four Ways to Mitigate Cyber Risks for ERP Applications
Related: Another Critical Vulnerability Patched in SAP Commerce
Related: Hackers Compromise 62 Colleges via Campus ERP Platform

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
Latest News
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Cyber Insights 2023 | Zero Trust and Identity and Access Management
- Cyber Insights 2023 | The Coming of Web3
- European Police Arrest 42 After Cracking Covert App
- Florida Hospital Cancels Procedures, Diverts Patients Following Cyberattack
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- Fraudulent “CryptoRom” Apps Slip Through Apple and Google App Store Review Process
