Article Details

Scrape Timestamp (UTC): 2025-09-10 01:05:03.264

Source: https://thehackernews.com/2025/09/sap-patches-critical-netweaver-cvss-up.html

Original Article Text

Click to Toggle View

SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws. SAP on Tuesday released security updates to address multiple security flaws, including three critical vulnerabilities in SAP Netweaver that could result in code execution and the upload arbitrary files. The vulnerabilities are listed below - "[CVE-2025-42944] allows an unauthenticated attacker to execute arbitrary OS commands by submitting a malicious payload to an open port," Onapsis said. "A successful exploit can lead to full compromise of the application. As a temporary workaround, customers should add P4 port filtering at the ICM level to prevent unknown hosts from connecting to the P4 port." Also addressed by SAP is a high-severity missing input validation bug in SAP S/4HANA (CVE-2025-42916, CVSS score: 8.1) that could permit an attacker with high privilege access to ABAP reports to delete the content of arbitrary database tables, should the tables not be protected by an authorization group. The patches arrive days after SecurityBridge and Pathlock disclosed that a critical security defect in SAP S/4HANA that was fixed by the company last month (CVE-2025-42957, CVSS score: 9.9) has come under active exploitation in the wild. While there is no evidence that the newly disclosed issues have been weaponized by bad actors, it's essential that users move to apply the necessary updates as soon as possible for optimal protection.

Daily Brief Summary

VULNERABILITIES // SAP Releases Critical Patches for NetWeaver and S/4HANA Flaws

SAP issued security updates addressing critical vulnerabilities in NetWeaver, with a CVSS score up to 10.0, posing risks of code execution and arbitrary file uploads.

An unauthenticated attacker could exploit CVE-2025-42944 to execute arbitrary OS commands, potentially compromising the entire application.

As a temporary measure, SAP recommends adding P4 port filtering at the ICM level to block unauthorized access.

A high-severity bug in SAP S/4HANA (CVE-2025-42916) could allow high-privilege users to delete database table contents without proper authorization.

Recent disclosures revealed active exploitation of another critical S/4HANA flaw (CVE-2025-42957), emphasizing the need for timely patch application.

Organizations are urged to apply the latest patches promptly to safeguard against potential exploitation and maintain system integrity.