A critical security vulnerability has been discovered in SAP NetWeaver Application Server for ABAP that allows authenticated attackers to bypass standard authorization checks and escalate their privileges within enterprise systems. The vulnerability, tracked as CVE-2025-42989 and assigned a CVSS score of 9.6, was addressed in SAP’s June 2025 Security Patch Day. The flaw allows low-privileged authenticated users to execute function modules without proper authorization verification, resulting in significant privilege escalation that can critically impact both system integrity and availability.
Source: https://cybersecuritynews.com/critical-sap-netweaver-vulnerability/
TPRM report: https://scoringcyber.rankiteo.com/company/sap
"id": "sap909061025",
"linkid": "sap",
"type": "Vulnerability",
"date": "6/2025",
"severity": "50",
"impact": "1",
"explanation": "Attack without any consequences"
{'affected_entities': [{'industry': 'Technology',
'name': 'SAP',
'type': 'Software Provider'}],
'attack_vector': 'Privilege Escalation',
'date_publicly_disclosed': '2025-06-01',
'description': 'A critical security vulnerability (CVE-2025-42989) in SAP '
'NetWeaver Application Server for ABAP allows authenticated '
'attackers to bypass standard authorization checks and '
'escalate privileges within enterprise systems. The flaw '
'resides within the RFC framework, affecting tRFC and qRFC '
'operations, and was addressed in SAP’s June 2025 Security '
'Patch Day.',
'lessons_learned': 'Immediate implementation of security patches and careful '
'planning of configuration changes are critical to '
'mitigate vulnerabilities.',
'post_incident_analysis': {'corrective_actions': 'Implement SAP Security Note '
'#3600840 and follow the FAQ '
'Note #3601919 for proper '
'role adjustments.',
'root_causes': 'Missing authorization check in RFC '
'inbound processing.'},
'recommendations': 'Organizations should prioritize the patch and carefully '
'plan the implementation of authorization changes to avoid '
'impacting existing system integrations.',
'references': [{'source': 'Onapsis Report'}],
'response': {'remediation_measures': 'Implement SAP Security Note #3600840 '
'and configure necessary role '
'adjustments and profile parameters.'},
'title': 'Critical Privilege Escalation Vulnerability in SAP NetWeaver '
'Application Server for ABAP',
'type': 'Vulnerability Exploitation',
'vulnerability_exploited': 'CVE-2025-42989'}