The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-33690

CVE-2021-33690: SAP NetWeaver NWDI SSRF Vulnerability

CVE-2021-33690 is a Server-Side Request Forgery flaw in SAP NetWeaver Development Infrastructure Component Build Service that enables attackers to perform proxy attacks and compromise sensitive data. This article covers the technical details, affected versions, impact assessment, and mitigation strategies.

Published: March 4, 2026

CVE-2021-33690 Overview

A critical Server-Side Request Forgery (SSRF) vulnerability has been identified in the SAP NetWeaver Development Infrastructure (NWDI) Component Build Service. This vulnerability allows authenticated threat actors with server access to perform proxy attacks by sending crafted queries. Successful exploitation could lead to complete compromise of sensitive data residing on the server and significantly impact its availability.

The severity of this vulnerability is particularly dependent on the deployment context—organizations running SAP NWDI exposed to the internet face the highest risk, as reflected in the critical severity rating.

Critical Impact

Authenticated attackers can leverage SSRF to completely compromise sensitive data on the server and impact availability. The vulnerability is especially severe when SAP NWDI is internet-accessible.

Affected Products

  • SAP NetWeaver Development Infrastructure 7.11
  • SAP NetWeaver Development Infrastructure 7.20
  • SAP NetWeaver Development Infrastructure 7.30
  • SAP NetWeaver Development Infrastructure 7.31
  • SAP NetWeaver Development Infrastructure 7.40
  • SAP NetWeaver Development Infrastructure 7.50

Discovery Timeline

  • September 15, 2021 - CVE-2021-33690 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2021-33690

Vulnerability Analysis

CVE-2021-33690 is classified as CWE-918 (Server-Side Request Forgery), a vulnerability class that allows attackers to induce server-side applications to make HTTP requests to arbitrary domains. In the context of SAP NetWeaver Development Infrastructure, the Build Service component fails to properly validate and sanitize user-supplied URL inputs before making server-side requests.

The vulnerability enables authenticated attackers to abuse the server as a proxy to reach internal resources that would otherwise be inaccessible from external networks. This can expose internal services, metadata endpoints, and sensitive configuration data. The scope change capability means successful exploitation can impact resources beyond the vulnerable component's security scope.

Root Cause

The root cause of this vulnerability lies in insufficient input validation within the SAP NetWeaver Development Infrastructure Build Service component. The application does not adequately verify or restrict the destination of server-side HTTP requests, allowing attackers to redirect these requests to arbitrary internal or external endpoints. This lack of proper URL validation enables the server to be weaponized as an SSRF proxy.

Attack Vector

The attack vector for CVE-2021-33690 requires network access and low-privilege authentication to the vulnerable SAP NetWeaver Development Infrastructure system. Once authenticated, a threat actor can craft malicious queries targeting the Build Service component. These queries manipulate the server into making requests to attacker-specified destinations, including:

  • Internal network resources typically protected by firewalls
  • Cloud metadata endpoints (e.g., AWS IMDSv1, Azure IMDS)
  • Internal administrative interfaces
  • Database servers and other backend services

The vulnerability is particularly dangerous in environments where SAP NWDI is exposed to the internet, as it provides a pivot point for attackers to explore and exploit internal infrastructure. The attacker does not require user interaction to exploit this vulnerability.

Detection Methods for CVE-2021-33690

Indicators of Compromise

  • Unusual outbound HTTP/HTTPS requests from SAP NetWeaver servers to internal IP ranges (e.g., 10.x.x.x, 172.16.x.x, 192.168.x.x) or cloud metadata endpoints
  • Build Service log entries containing requests to non-standard or internal URLs
  • Unexpected traffic patterns from the NWDI Build Service to internal services or external suspicious domains
  • Authentication events followed by anomalous server-side request activity

Detection Strategies

  • Implement network monitoring to identify server-initiated requests to internal network ranges or known metadata endpoints (e.g., 169.254.169.254)
  • Deploy web application firewall (WAF) rules to detect and block SSRF patterns in requests to the Build Service
  • Enable detailed audit logging on SAP NetWeaver systems and correlate with network traffic analysis
  • Monitor for requests containing URL parameters pointing to internal resources or using file://, gopher://, or dict:// protocols

Monitoring Recommendations

  • Configure SIEM rules to alert on SAP NetWeaver Build Service making requests to internal IP ranges or cloud metadata services
  • Establish baseline network behavior for NWDI systems and alert on deviations
  • Implement egress filtering and monitoring to detect unauthorized outbound connections from SAP servers

How to Mitigate CVE-2021-33690

Immediate Actions Required

  • Apply the security patch referenced in SAP Note #3072955 immediately
  • Restrict network access to SAP NetWeaver Development Infrastructure systems to trusted networks only
  • Ensure SAP NWDI is not directly exposed to the internet; place behind a VPN or other access control mechanism
  • Review and audit authentication logs for any suspicious access patterns

Patch Information

SAP has released a security patch addressing CVE-2021-33690. Organizations should consult SAP Note #3072955 for detailed patching instructions and the SAP Security Advisory for additional context. It is critical to apply this patch to all affected versions (7.11, 7.20, 7.30, 7.31, 7.40, 7.50) of SAP NetWeaver Development Infrastructure.

Workarounds

  • Implement network segmentation to isolate SAP NWDI systems from sensitive internal resources and the internet
  • Deploy egress filtering rules on firewalls to prevent the SAP server from making requests to unauthorized internal or external destinations
  • Use a reverse proxy or WAF with SSRF protection capabilities in front of the Build Service
  • Disable or restrict access to the Build Service component if not required for business operations
bash
# Example: Configure network-level egress restrictions (firewall rule concept)
# Block SAP NWDI server from accessing internal metadata endpoints
iptables -A OUTPUT -s <SAP_NWDI_SERVER_IP> -d 169.254.169.254 -j DROP

# Restrict outbound connections to only necessary destinations
iptables -A OUTPUT -s <SAP_NWDI_SERVER_IP> -m state --state NEW -j LOG --log-prefix "NWDI_EGRESS: "

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSSRF

  • Vendor/TechSap Netweaver

  • SeverityCRITICAL

  • CVSS Score9.9

  • EPSS Probability93.26%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-918
  • Technical References
  • SAP Note #3072955
  • Vendor Resources
  • SAP Wiki Page Overview
  • Related CVEs
  • CVE-2026-24316: SAP NetWeaver ABAP SSRF Vulnerability

  • CVE-2026-27685: SAP NetWeaver Privilege Escalation Flaw

  • CVE-2026-27684: SAP NetWeaver SQL Injection Vulnerability

  • CVE-2026-24309: SAP NetWeaver ABAP Privilege Escalation
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English