Query Details
// https://www.bleepingcomputer.com/news/security/over-1-200-sap-netweaver-servers-vulnerable-to-actively-exploited-flaw/ let InternetFacing = DeviceInfo | where IsInternetFacing == true and isnotempty(PublicIP) | distinct DeviceId; DeviceProcessEvents | where TimeGenerated > ago(90d) | where InitiatingProcessVersionInfoProductName has "netweaver" | summarize arg_max(TimeGenerated, *) by DeviceId | where DeviceId has_any(InternetFacing)
This KQL (Kusto Query Language) query is designed to identify potentially vulnerable SAP NetWeaver servers that are exposed to the internet. Here's a simplified breakdown of what the query does:
Identify Internet-Facing Devices:
DeviceInfo table to find devices that are internet-facing (i.e., they have a public IP address).IsInternetFacing field is true and the PublicIP field is not empty.DeviceId.Find NetWeaver Processes:
DeviceProcessEvents table to find events from the last 90 days (TimeGenerated > ago(90d)).InitiatingProcessVersionInfoProductName contains "netweaver", indicating they are related to SAP NetWeaver.Summarize Recent Events:
arg_max(TimeGenerated, *)) to get the latest process information for each device.Filter for Internet-Facing Devices:
In summary, this query identifies the most recent SAP NetWeaver-related processes running on devices that are exposed to the internet, which could potentially be vulnerable to exploitation.

Steven Lim
Released: May 1, 2025
Tables
Keywords
Operators