Article Details

Scrape Timestamp (UTC): 2025-09-05 18:12:52.952

Source: https://www.theregister.com/2025/09/05/critical_sap_s4hana_bug_exploited/

Original Article Text

Click to Toggle View

Critical, make-me-super-user SAP S/4HANA bug under active exploitation. 9.9-rated flaw on the loose, so patch now. A critical code-injection bug in SAP S/4HANA that allows low-privileged attackers to take over your SAP system is being actively exploited, according to security researchers. SAP issued a patch for the 9.9-rated flaw in August. It is tracked as CVE-2025-42957, and it affects both private cloud and on-premises versions. According to SecurityBridge Threat Research Labs, which originally spotted and disclosed the vulnerability to SAP,  the team "verified actual abuse of this vulnerability." It doesn't appear to be widespread (yet), but the consequences of this flaw are especially severe. "For example, SecurityBridge's team demonstrated in a lab environment how an attacker could create a new SAP superuser account (with SAP_ALL privileges) and directly manipulate critical business data," the researchers said in a Thursday write-up alongside a video demo of the exploit. It's low-complexity to exploit. The bug enables a user to inject arbitrary ABAP code into the system, thus bypassing authorization checks and essentially creating a backdoor that allows full system compromise, data theft, and operational disruption. In other words: it's effectively game over. SAP didn't immediately respond to The Register's inquiries about CVE-2025-42957 and the scope of exploitation. We will update this story when we hear back from the vendor. If you're a customer, apply SAP's August security updates immediately. Also, as SecurityBridge suggests: "Consider implementing SAP UCON to restrict RFC usage and review and restrict access to authorization object S_DMIS activity 02" to limit exposure. Watch for suspicious RFC calls, or any new admin-level users being created, along with ABAP code changes, as all of these could indicate you've been pwned.

Daily Brief Summary

VULNERABILITIES // Critical SAP S/4HANA Vulnerability Actively Exploited, Urgent Patching Advised

A critical code-injection flaw in SAP S/4HANA, rated 9.9, is currently under active exploitation, posing severe risks to affected systems.

The vulnerability, tracked as CVE-2025-42957, impacts both private cloud and on-premises versions, allowing attackers to take over SAP systems.

SecurityBridge Threat Research Labs discovered the flaw and confirmed its exploitation, demonstrating potential for creating unauthorized superuser accounts and manipulating business data.

The flaw's low complexity enables attackers to inject arbitrary ABAP code, bypassing authorization checks and compromising system integrity and data security.

SAP released a patch in August; organizations are urged to apply these updates immediately to mitigate potential exploitation risks.

Customers are advised to implement SAP UCON to restrict RFC usage and monitor for suspicious activity, such as unauthorized admin-level user creation and ABAP code modifications.

The vulnerability's exploitation could lead to full system compromise, data theft, and operational disruptions, necessitating immediate defensive measures.