SAP Addresses Critical Vulnerabilities in NetWeaver and High-Severity Flaws in S/4HANA
On September 10, 2025, SAP issued several security updates aimed at mitigating significant vulnerabilities in its software, particularly within SAP NetWeaver. Among the disclosed issues are three critical vulnerabilities categorized with a Common Vulnerability Scoring System (CVSS) score peaking at 10.0. These vulnerabilities have the potential to allow unauthorized code execution and arbitrary file uploads, making them particularly alarming for businesses relying on this software.
The first critical vulnerability, identified as CVE-2025-42944, pertains to a deserialization flaw within SAP NetWeaver. This vulnerability could potentially enable unauthenticated adversaries to exploit an open port in the RMI-P4 module by submitting a malicious payload, thereby executing operating system commands. Such a vulnerability exposes organizations to the risk of severe operational disruptions and data breaches.
The second vulnerability, CVE-2025-42922, relates to insecure file operations within SAP NetWeaver AS Java. Here, an attacker possessing non-administrative user credentials could upload arbitrary files. This oversight in file handling practices can lead to further system exploitation, allowing unauthorized actions within the environment.
Another critical concern is CVE-2025-42958, a missing authentication check vulnerability within the SAP NetWeaver application used on IBM i-series platforms. This flaw could empower highly privileged unauthorized users to read, modify, or delete sensitive information, as well as gain access to critical administrative functionalities. The ramifications of such vulnerabilities could be significant, potentially leading to data leaks and compliance violations.
The targeted software is widely utilized across various sectors and organizations, raising the stakes for businesses dependent on SAP products, particularly those within the United States. The implications of these vulnerabilities underscore the growing need for robust cybersecurity measures.
In analyzing the potential adversary tactics linked to these vulnerabilities, insights from the MITRE ATT&CK framework offer useful context. Techniques like initial access could relate to the exploitation of the deserialization vulnerability, while privilege escalation tactics might be leveraged by attackers capitalizing on insecure file operations or missing authentication checks.
The release of these security updates serves as a crucial reminder for business owners and IT professionals to prioritize regular software updates and security audits within their organizations. As cyber threats continue to evolve, staying informed and proactive is key to safeguarding sensitive data and maintaining the integrity of business operations. Now more than ever, vigilance in cybersecurity practices is essential in mitigating risks associated with such vulnerabilities.