Article Details

Original Article Text

Click to Toggle View

Critical SAP S/4HANA vulnerability now exploited in attacks. A critical SAP S/4HANA code injection vulnerability is being leveraged in attacks in the wild to breach exposed servers, researchers warn. The flaw, tracked as CVE-2025-42957, is an ABAP code injection problem in an RFC-exposed function module of SAP S/4HANA, allowing low-privileged authentication users to inject arbitrary code, bypass authorization, and fully take over SAP. The vendor fixed the vulnerability on August 11, 2025, rating it critical (CVSS score: 9.9). However, several systems have not applied the available security updates, and these are now being targeted by hackers who have weaponized the bug. According to a report by SecurityBridge, CVE-2025-42957 is now under active, albeit limited, exploitation in the wild. SecurityBridge stated that it discovered the vulnerability and reported it responsibly to SAP on June 27, 2025, and even assisted in the development of a patch. However, due to the openness of the impacted components and the ability to reverse engineer the fixes, it is trivial for highly skilled, knowledgeable threat actors to figure out the exploit themselves. "While widespread exploitation has not yet been reported, SecurityBridge has verified actual abuse of this vulnerability," reads the SecurityBridge report. "That means attackers already know how to use it – leaving unpatched SAP systems exposed." "Additionally, reverse engineering the patch to create an exploit is relatively easy for SAP ABAP, since the ABAP code is open to see for everyone." The security firm warned that the potential ramifications of CVE-2025-42957 exploitation include data theft, data manipulation, code injection, privilege escalation through the creation of backdoor accounts, credential theft, and operational disruption through malware, ransomware, or other means. SecurityBridge created a video demonstrating how the vulnerability can be exploited to run system commands on SAP servers. SAP administrators who haven't applied the August 2025 Patch Day updates yet should do so as soon as possible. The affected products and versions are: A bulletin containing more information about the recommended actions is available here, but is only viewable by SAP customers with an account. BleepingComputer contacted SAP and SecurityBridge to ask how CVE-2025-42957 is being exploited, but we are still waiting for a response. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.

Daily Brief Summary

VULNERABILITIES // Critical SAP S/4HANA Vulnerability Exploited Amid Patch Delays

A critical vulnerability, CVE-2025-42957, in SAP S/4HANA is actively exploited, allowing attackers to inject arbitrary code and take over systems.

The flaw resides in an RFC-exposed function module, posing significant risks such as data theft and operational disruption.

Despite a patch released on August 11, 2025, many systems remain unpatched, making them susceptible to attacks.

SecurityBridge discovered and reported the vulnerability, aiding SAP in developing a patch, but exploitation persists due to unpatched systems.

The vulnerability allows low-privileged users to bypass authorizations, escalating their privileges through backdoor account creation.

SecurityBridge warns of potential impacts, including credential theft and malware deployment, urging immediate patch application.

SAP administrators are advised to apply the August 2025 Patch Day updates to mitigate risks associated with this vulnerability.