SAP Releases Critical Patches for NetWeaver (CVSS Scores Up to 10.0) and High-Risk S/4HANA Vulnerabilities

Date: September 10, 2025
Category: Software Security / Vulnerability

On Tuesday, SAP issued security updates to rectify numerous vulnerabilities, including three critical flaws in SAP NetWeaver that could lead to remote code execution and unauthorized file uploads. Details of the vulnerabilities are as follows:

  • CVE-2025-42944 (CVSS Score: 10.0) – A deserialization vulnerability in SAP NetWeaver that allows unauthenticated attackers to submit malicious payloads via the RMI-P4 module, potentially executing operating system commands.
  • CVE-2025-42922 (CVSS Score: 9.9) – An insecure file operations vulnerability in SAP NetWeaver AS Java enabling authenticated non-administrative users to upload arbitrary files.
  • CVE-2025-42958 (CVSS Score: 9.1) – A missing authentication check in the SAP NetWeaver application on IBM i-series, which could let unauthorized highly privileged users read, modify, or delete sensitive information, and access administrative functionalities.

SAP Addresses Critical Vulnerabilities in NetWeaver and High-Severity Flaws in S/4HANA

On September 10, 2025, SAP issued several security updates aimed at mitigating significant vulnerabilities in its software, particularly within SAP NetWeaver. Among the disclosed issues are three critical vulnerabilities categorized with a Common Vulnerability Scoring System (CVSS) score peaking at 10.0. These vulnerabilities have the potential to allow unauthorized code execution and arbitrary file uploads, making them particularly alarming for businesses relying on this software.

The first critical vulnerability, identified as CVE-2025-42944, pertains to a deserialization flaw within SAP NetWeaver. This vulnerability could potentially enable unauthenticated adversaries to exploit an open port in the RMI-P4 module by submitting a malicious payload, thereby executing operating system commands. Such a vulnerability exposes organizations to the risk of severe operational disruptions and data breaches.

The second vulnerability, CVE-2025-42922, relates to insecure file operations within SAP NetWeaver AS Java. Here, an attacker possessing non-administrative user credentials could upload arbitrary files. This oversight in file handling practices can lead to further system exploitation, allowing unauthorized actions within the environment.

Another critical concern is CVE-2025-42958, a missing authentication check vulnerability within the SAP NetWeaver application used on IBM i-series platforms. This flaw could empower highly privileged unauthorized users to read, modify, or delete sensitive information, as well as gain access to critical administrative functionalities. The ramifications of such vulnerabilities could be significant, potentially leading to data leaks and compliance violations.

The targeted software is widely utilized across various sectors and organizations, raising the stakes for businesses dependent on SAP products, particularly those within the United States. The implications of these vulnerabilities underscore the growing need for robust cybersecurity measures.

In analyzing the potential adversary tactics linked to these vulnerabilities, insights from the MITRE ATT&CK framework offer useful context. Techniques like initial access could relate to the exploitation of the deserialization vulnerability, while privilege escalation tactics might be leveraged by attackers capitalizing on insecure file operations or missing authentication checks.

The release of these security updates serves as a crucial reminder for business owners and IT professionals to prioritize regular software updates and security audits within their organizations. As cyber threats continue to evolve, staying informed and proactive is key to safeguarding sensitive data and maintaining the integrity of business operations. Now more than ever, vigilance in cybersecurity practices is essential in mitigating risks associated with such vulnerabilities.

Source link