SAP

SAP

SAP addressed a **critical insecure deserialization vulnerability (CVE-2025-42944, CVSS 10.0)** in its **SAP NetWeaver** platform, allowing unauthenticated attackers to execute arbitrary OS commands via malicious payloads submitted through the **RMI-P4 module** on an open port. Successful exploitation could fully compromise the **confidentiality, integrity, and availability** of the affected system, enabling attackers to take control of servers, steal sensitive data, or disrupt operations. While no in-the-wild attacks were reported, the flaw posed a severe risk to enterprises relying on NetWeaver for core business processes. Additionally, SAP patched a **Directory Traversal vulnerability (CVE-2025-42937, CVSS 9.8)** in **SAP Print Service (SAPSprint)**, permitting unauthenticated attackers to overwrite system files via path traversal, and an **Unrestricted File Upload flaw (CVE-2025-42910, CVSS 9.0)** in **SAP Supplier Relationship Management**, allowing authenticated attackers to upload and execute malicious files. These vulnerabilities collectively exposed organizations to **data breaches, system takeovers, and operational disruptions**, particularly in supply chain and enterprise resource planning (ERP) environments.

Source: https://securityaffairs.com/183420/security/sap-fixed-maximum-severity-bug-in-netweaver.html

TPRM report: https://www.rankiteo.com/company/sap

"id": "sap0433304101525",
"linkid": "sap",
"type": "Vulnerability",
"date": "6/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'industry': 'Enterprise Software',
                        'location': 'Walldorf, Germany',
                        'name': 'SAP SE',
                        'size': 'Large (100,000+ employees)',
                        'type': 'Software Corporation'}],
 'attack_vector': ['Network (RMI-P4 module)',
                   'Path Traversal (SAP Print Service)',
                   'File Upload (SAP Supplier Relationship Management)'],
 'customer_advisories': 'SAP customers urged to apply patches for the three '
                        'critical vulnerabilities.',
 'date_publicly_disclosed': '2025-10-15',
 'description': 'SAP addressed 13 new vulnerabilities, including a maximum '
                'severity issue (CVE-2025-42944, CVSS score of 10.0) in SAP '
                'NetWeaver. The vulnerability is an **insecure '
                'deserialization** that could lead to **arbitrary command '
                'execution** by an unauthenticated attacker via the **RMI-P4 '
                'module** through an open port. The deserialization of '
                'untrusted Java objects could compromise the application’s '
                '**confidentiality, integrity, and availability**. Two other '
                'critical flaws were patched: **CVE-2025-42937** (Directory '
                'Traversal in SAP Print Service, CVSS 9.8) and '
                '**CVE-2025-42910** (Unrestricted File Upload in SAP Supplier '
                'Relationship Management, CVSS 9.0). No attacks in the wild '
                'were reported.',
 'impact': {'brand_reputation_impact': 'Potential (due to critical '
                                       'vulnerabilities in enterprise '
                                       'software)',
            'operational_impact': 'High (potential compromise of '
                                  'confidentiality, integrity, and '
                                  'availability)',
            'systems_affected': ['SAP NetWeaver',
                                 'SAP Print Service (SAPSprint)',
                                 'SAP Supplier Relationship Management']},
 'investigation_status': 'Resolved (patches released; no evidence of '
                         'exploitation in the wild)',
 'lessons_learned': 'Critical vulnerabilities in enterprise software like SAP '
                    'NetWeaver can expose organizations to severe risks (e.g., '
                    'arbitrary command execution) if left unpatched. Proactive '
                    'patch management and input validation (e.g., '
                    'deserialization, file uploads) are essential to mitigate '
                    'such threats.',
 'post_incident_analysis': {'corrective_actions': ['Released security patches '
                                                   'to address the '
                                                   'vulnerabilities.',
                                                   'Enhanced input validation '
                                                   'mechanisms in affected '
                                                   'components.',
                                                   'Encouraged customers to '
                                                   'implement least-privilege '
                                                   'access controls.'],
                            'root_causes': ['Insecure deserialization in SAP '
                                            'NetWeaver (lack of input '
                                            'validation for Java objects).',
                                            'Missing path traversal '
                                            'protections in SAP Print Service.',
                                            'Inadequate file type/content '
                                            'verification in SAP Supplier '
                                            'Relationship Management.']},
 'recommendations': ['Apply SAP security patches for CVE-2025-42944, '
                     'CVE-2025-42937, and CVE-2025-42910 immediately.',
                     'Restrict network access to SAP NetWeaver’s RMI-P4 module '
                     'and other exposed services.',
                     'Implement strict file type/content validation for '
                     'uploads in SAP Supplier Relationship Management.',
                     'Monitor for unauthorized file modifications in SAP Print '
                     'Service (SAPSprint).',
                     'Conduct regular security audits for deserialization '
                     'vulnerabilities in Java-based applications.'],
 'references': [{'date_accessed': '2025-10-15',
                 'source': 'SecurityAffairs',
                 'url': 'https://securityaffairs.com/153422/security/sap-fixed-maximum-severity-bug-netweaver.html'},
                {'source': 'SAP Security Notes'}],
 'response': {'communication_strategy': ['Public advisory via SAP Security '
                                         'Notes',
                                         'Media coverage (e.g., '
                                         'SecurityAffairs)'],
              'containment_measures': ['Software patches released for '
                                       'CVE-2025-42944, CVE-2025-42937, '
                                       'CVE-2025-42910'],
              'incident_response_plan_activated': 'Yes (vulnerabilities '
                                                  'patched)',
              'remediation_measures': ['Users advised to apply security '
                                       'updates immediately']},
 'title': 'SAP Fixed Maximum-Severity Bug in NetWeaver (CVE-2025-42944)',
 'type': ['Vulnerability Disclosure',
          'Arbitrary Command Execution',
          'Insecure Deserialization',
          'Directory Traversal',
          'Unrestricted File Upload'],
 'vulnerability_exploited': [{'affected_component': 'RMI-P4 module',
                              'cve_id': 'CVE-2025-42944',
                              'cvss_score': 10.0,
                              'description': 'Insecure deserialization in SAP '
                                             'NetWeaver leading to arbitrary '
                                             'OS command execution '
                                             '(unauthenticated).'},
                             {'affected_component': 'SAP Print Service',
                              'cve_id': 'CVE-2025-42937',
                              'cvss_score': 9.8,
                              'description': 'Directory Traversal in SAP Print '
                                             'Service (SAPSprint) allowing '
                                             'unauthenticated file overwrite.'},
                             {'affected_component': 'SAP Supplier Relationship '
                                                    'Management',
                              'cve_id': 'CVE-2025-42910',
                              'cvss_score': 9.0,
                              'description': 'Unrestricted File Upload in SAP '
                                             'Supplier Relationship Management '
                                             'due to missing file type/content '
                                             'verification (authenticated).'}]}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.