Article Details

Scrape Timestamp (UTC): 2025-04-25 15:34:07.130

Source: https://www.theregister.com/2025/04/25/sap_netweaver_patch/

Original Article Text

Click to Toggle View

Emergency patch for potential SAP zero-day that could grant full system control. German software giant paywalls details, but experts piece together the clues. SAP's latest out-of-band patch is for a perfect 10/10 bug in NetWeaver that experts suspect could have already been exploited as a zero-day. However, we can't say for sure whether that's the case because the German software shop has restricted access to the details behind a customer paywall. The vulnerability's CVE identifier is known, though, (CVE-2025-31324) and from the limited description entered into the National Vulnerability Database, we understand it's a flaw with the metadata uploader component in NetWeaver's no-code Visual Composer app-building tool. The NVD entry reads: "SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system." According to SAP security platform Onapsis, the vulnerability has indeed already been exploited as a zero-day and can afford attackers the opportunity to take full control over SAP business data and processes. That means the potential for ransomware deployment and lateral movement around a network is also on the cards. "We strongly recommend SAP customers to apply the emergency patch released by SAP earlier today, and assess vulnerable systems for compromise," it said via LinkedIn. Elsewhere, infosec watchers have noted the similarities between the limited description of the issue and the verbiage used by ReliaQuest in its writeup of a mystery vulnerability in SAP NetWeaver, published earlier this week. ReliaQuest researchers said on April 22 they had been investigating "multiple customer incidents" involving JSP webshells uploaded to SAP environments, several of which were fully updated and had patches applied. These webshells allowed attackers to upload files and execute code. At the time of publication, ReliaQuest said the issue at play was likely due to the exploitation of an old NetWeaver bug (CVE-2017-9844, 9.8) or a brand-new, undisclosed issue. Incident response efforts showed attackers who had already broken into customer environments were using the Brute Ratel red-teaming tool and the Heaven's Gate technique for code execution and detection evasion. ReliaQuest also warned that any potential exploits of the vulnerability could lead to compromises of high-value targets. Given that SAP is routinely used by large organizations and governments around the world – extensively throughout local and national government in the UK, for example – any zero-day vulnerabilities that could lead to ransomware are highly valuable to attackers. The Register asked SAP for more details.

Daily Brief Summary

MALWARE // SAP Releases Urgent Patch for Critical NetWeaver Vulnerability

SAP issued an emergency patch for a critical flaw in NetWeaver, rated a perfect 10/10 for severity.

The vulnerability, identified as CVE-2025-31324, affects the metadata uploader in the Visual Composer tool, allowing unauthorized code uploads.

Onapsis reports the flaw was exploited as a zero-day, potentially letting attackers control SAP business data and processes.

The flaw raises concerns for ransomware attacks and lateral movements within networks.

Limited detail available publicly as SAP has paywalled extensive information, restricting access to customers.

Similarities noted between this issue and earlier SAP NetWeaver vulnerabilities described by ReliaQuest.

Experts urge SAP customers to apply the patch immediately and check systems for signs of compromise.

High-value targets, including large enterprises and government bodies, are at risk due to widespread SAP usage.