Public Exploit Combines Two Critical SAP Vulnerabilities, Leaving Unpatched Systems Open to Remote Code Execution

Date: Aug 19, 2025
Category: Vulnerability / Cyber Espionage

A new exploit has emerged that leverages two critical, now-patched vulnerabilities in SAP NetWeaver, putting organizations at significant risk of system compromise and data theft. This exploit chains CVE-2025-31324 and CVE-2025-42999 to bypass authentication and enable remote code execution, according to SAP security firm Onapsis.

  • CVE-2025-31324 (CVSS score: 10.0) – Lacks authorization checks in SAP NetWeaver’s Visual Composer development server
  • CVE-2025-42999 (CVSS score: 9.1) – Vulnerability due to insecure deserialization in the same server

These vulnerabilities were patched by SAP in April and May 2025, but not before they were exploited as zero-days by threat actors as early as March. Multiple ransomware and data extortion groups, including Qilin, BianLian, and RansomExx, have been seen exploiting these flaws, along with several espionage groups linked to China targeting critical infrastructures.

Public Exploit for Chained SAP Vulnerabilities Poses Risk of Remote Code Execution

August 19, 2025

A concerning new exploit has come to light that leverages two critical security vulnerabilities in SAP NetWeaver, introducing significant risks for organizations that have yet to apply patches. This exploit combines CVE-2025-31324 and CVE-2025-42999, enabling attackers to bypass authentication measures and execute code remotely, according to findings from SAP security firm Onapsis.

CVE-2025-31324, which has received a maximum CVSS score of 10.0, pertains to an inadequate authorization check within SAP NetWeaver’s Visual Composer development server. In contrast, CVE-2025-42999, rated at 9.1, involves insecure deserialization vulnerabilities within the same development environment. While SAP addressed these weaknesses in April and May 2025, evidence indicates that threat actors had already exploited them as zero-day vulnerabilities since at least March.

Targeting both corporate and critical infrastructure systems, multiple ransomware and data extortion groups—including Qilin, BianLian, and RansomExx—have been seen actively weaponizing these flaws. Additionally, several espionage groups linked to China have reportedly utilized these vulnerabilities to conduct targeted attacks, further complicating the security landscape.

Organizations relying on SAP NetWeaver should take immediate action to apply the security updates to safeguard against potential exploitation. In the context of the MITRE ATT&CK framework, attackers employing these vulnerabilities could have initiated the compromise through tactics such as initial access and exploitation of a public-facing application. The techniques used for persistence and privilege escalation may also come into play as attackers traverse the environment following initial compromise.

With the increasing sophistication of cyber threats, it is imperative for business owners to remain vigilant and informed about such vulnerabilities. The evolving landscape of cyber risks demands a proactive approach to cybersecurity, ensuring systems are fortified against both known and emerging threats. It is essential to prioritize timely patching practices and implement robust security measures to mitigate the impacts of potential exploits.

Source link