Critical vulnerabilities in SAP NetWeaver and related products addressed
Summary
Hide ▲
Show ▼
SAP has released security updates addressing multiple vulnerabilities, including three critical flaws in NetWeaver and a high-severity issue in S/4HANA. The most severe, CVE-2025-42944, allows unauthenticated attackers to execute arbitrary OS commands via an insecure deserialization vulnerability in the RMI-P4 module. The second critical flaw, CVE-2025-42922, enables authenticated attackers to upload arbitrary files, potentially leading to full system compromise. The third critical vulnerability, CVE-2025-42958, allows unauthorized high-privileged users to access sensitive data and administrative functions. Additionally, a high-severity missing input validation bug in SAP S/4HANA (CVE-2025-42916) was patched, which could permit attackers to delete the content of arbitrary database tables. These vulnerabilities affect SAP NetWeaver, the foundation for various business applications like ERP, CRM, SRM, and SCM, widely deployed in large enterprise networks. The RMI-P4 port, used for internal SAP-to-SAP communication, may be exposed to wider networks due to misconfigurations. SAP products are frequent targets for high-value compromises due to their handling of mission-critical data. Earlier this month, a critical code injection vulnerability (CVE-2025-42957) was exploited in S/4HANA, Business One, and NetWeaver products. SAP has also updated security notes for other high-severity vulnerabilities in Business One, Landscape Transformation Replication Server, and S/4HANA.
Timeline
-
10.09.2025 04:03 1 articles · 19d ago
SAP releases patch for high-severity S/4HANA input validation flaw
The article details a high-severity missing input validation bug in SAP S/4HANA (CVE-2025-42916) with a CVSS score of 8.1. This vulnerability could allow an attacker with high privilege access to ABAP reports to delete the content of arbitrary database tables. The article underscores the urgency of applying the patch to prevent potential exploitation.
Show sources
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
09.09.2025 16:18 3 articles · 20d ago
SAP addresses critical vulnerabilities in NetWeaver and related products
The article confirms the three critical vulnerabilities in SAP NetWeaver and provides additional details on the potential impact of these flaws. It also notes that SAP has released patches for a high-severity missing input validation bug in SAP S/4HANA (CVE-2025-42916), which could allow attackers to delete the content of arbitrary database tables. The article emphasizes the importance of applying these patches promptly to mitigate the risk of exploitation by threat actors. The new patches arrive days after the disclosure that a critical security defect in SAP S/4HANA (CVE-2025-42957) has come under active exploitation in the wild.
Show sources
- SAP fixes maximum severity NetWeaver command execution flaw — www.bleepingcomputer.com — 09.09.2025 16:18
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
Information Snippets
-
SAP NetWeaver is a middleware solution used as the foundation for various business applications, including ERP, CRM, SRM, and SCM.
First reported: 09.09.2025 16:183 sources, 3 articlesShow sources
- SAP fixes maximum severity NetWeaver command execution flaw — www.bleepingcomputer.com — 09.09.2025 16:18
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
CVE-2025-42944 is an insecure deserialization vulnerability in SAP NetWeaver (RMIP4), ServerCore 7.50, with a CVSS score of 10.0.
First reported: 09.09.2025 16:183 sources, 3 articlesShow sources
- SAP fixes maximum severity NetWeaver command execution flaw — www.bleepingcomputer.com — 09.09.2025 16:18
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
Exploitation of CVE-2025-42944 allows unauthenticated attackers to execute arbitrary OS commands via the RMI-P4 module.
First reported: 09.09.2025 16:183 sources, 3 articlesShow sources
- SAP fixes maximum severity NetWeaver command execution flaw — www.bleepingcomputer.com — 09.09.2025 16:18
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
CVE-2025-42922 is an insecure file operations bug in NetWeaver AS Java (Deploy Web Service), J2EE-APPS 7.50, with a CVSS score of 9.9.
First reported: 09.09.2025 16:183 sources, 3 articlesShow sources
- SAP fixes maximum severity NetWeaver command execution flaw — www.bleepingcomputer.com — 09.09.2025 16:18
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
Exploitation of CVE-2025-42922 allows authenticated attackers to upload arbitrary files, potentially leading to full system compromise.
First reported: 09.09.2025 16:183 sources, 3 articlesShow sources
- SAP fixes maximum severity NetWeaver command execution flaw — www.bleepingcomputer.com — 09.09.2025 16:18
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
CVE-2025-42958 is a missing authentication check in NetWeaver, with a CVSS score of 9.1.
First reported: 09.09.2025 16:183 sources, 3 articlesShow sources
- SAP fixes maximum severity NetWeaver command execution flaw — www.bleepingcomputer.com — 09.09.2025 16:18
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
Exploitation of CVE-2025-42958 allows unauthorized high-privileged users to access sensitive data and administrative functions.
First reported: 09.09.2025 16:183 sources, 3 articlesShow sources
- SAP fixes maximum severity NetWeaver command execution flaw — www.bleepingcomputer.com — 09.09.2025 16:18
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
The RMI-P4 port, used for internal SAP-to-SAP communication, may be exposed to wider networks due to misconfigurations.
First reported: 09.09.2025 16:183 sources, 3 articlesShow sources
- SAP fixes maximum severity NetWeaver command execution flaw — www.bleepingcomputer.com — 09.09.2025 16:18
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
SAP products are frequent targets for high-value compromises due to their handling of mission-critical data.
First reported: 09.09.2025 16:183 sources, 3 articlesShow sources
- SAP fixes maximum severity NetWeaver command execution flaw — www.bleepingcomputer.com — 09.09.2025 16:18
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
Earlier this month, a critical code injection vulnerability (CVE-2025-42957) was exploited in S/4HANA, Business One, and NetWeaver products.
First reported: 09.09.2025 16:182 sources, 2 articlesShow sources
- SAP fixes maximum severity NetWeaver command execution flaw — www.bleepingcomputer.com — 09.09.2025 16:18
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
The RMI-P4 module in AS Java is vulnerable to unauthenticated attackers submitting malicious payloads to an open port, leading to arbitrary OS command execution.
First reported: 09.09.2025 16:522 sources, 2 articlesShow sources
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
Exploitation of CVE-2025-42922 could lead to full system compromise upon file execution.
First reported: 09.09.2025 16:522 sources, 2 articlesShow sources
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
CVE-2025-42958 affects NetWeaver running on IBM i-series, allowing attackers with high privileges to access sensitive information and administrative functions.
First reported: 09.09.2025 16:522 sources, 2 articlesShow sources
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
SAP updated a security note from March 2023 addressing a critical directory traversal defect in NetWeaver AS ABAP.
First reported: 09.09.2025 16:522 sources, 2 articlesShow sources
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
SAP released additional high-severity patches for Business One (SLD), Landscape Transformation Replication Server, and S/4HANA (Private Cloud or On-Premise).
First reported: 09.09.2025 16:522 sources, 2 articlesShow sources
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
The remaining security notes address medium- and low-severity issues that could lead to various attacks, including DoS, CSRF, XSS, information disclosure, data tampering, privilege escalation, and access to restricted functionality.
First reported: 09.09.2025 16:522 sources, 2 articlesShow sources
- SAP Patches Critical NetWeaver Vulnerabilities — www.securityweek.com — 09.09.2025 16:52
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
CVE-2025-42916 is a high-severity missing input validation bug in SAP S/4HANA with a CVSS score of 8.1.
First reported: 10.09.2025 04:031 source, 1 articleShow sources
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
Exploitation of CVE-2025-42916 allows an attacker with high privilege access to ABAP reports to delete the content of arbitrary database tables.
First reported: 10.09.2025 04:031 source, 1 articleShow sources
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
-
The new patches arrive days after the disclosure that a critical security defect in SAP S/4HANA (CVE-2025-42957) has come under active exploitation in the wild.
First reported: 10.09.2025 04:031 source, 1 articleShow sources
- SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws — thehackernews.com — 10.09.2025 04:03
Similar Happenings
ForcedLeak Vulnerability in Salesforce Agentforce Exploited via AI Prompt Injection
A critical vulnerability in Salesforce Agentforce, named ForcedLeak, allowed attackers to exfiltrate sensitive CRM data through indirect prompt injection. The flaw affected organizations using Salesforce Agentforce with Web-to-Lead functionality enabled. The vulnerability was discovered and reported by Noma Security on July 28, 2025. Salesforce has since patched the issue and implemented additional security measures, including regaining control of an expired domain and preventing AI agent output from being sent to untrusted domains. The exploit involved manipulating the Description field in Web-to-Lead forms to execute malicious instructions, leading to data leakage. Salesforce has enforced a Trusted URL allowlist to mitigate the risk of similar attacks in the future. The ForcedLeak vulnerability is a critical vulnerability chain with a CVSS score of 9.4, described as a cross-site scripting (XSS) play for the AI era. The exploit involves embedding a malicious prompt in a Web-to-Lead form, which the AI agent processes, leading to data leakage. The attack could potentially lead to the exfiltration of internal communications, business strategy insights, and detailed customer information. Salesforce is addressing the root cause of the vulnerability by implementing more robust layers of defense for their models and agents.
CISA Emergency Directive 25-03: Mitigation of Cisco ASA Zero-Day Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 25-03, mandating federal agencies to identify and mitigate zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) exploited by an advanced threat actor. The directive requires agencies to account for all affected devices, collect forensic data, and upgrade or disconnect end-of-support devices by September 26, 2025. The vulnerabilities allow threat actors to maintain persistence and gain network access. Cisco identified multiple zero-day vulnerabilities (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363, and CVE-2025-20352) in Cisco ASA, Firewall Threat Defense (FTD) software, and Cisco IOS software. These vulnerabilities enable unauthenticated remote code execution, unauthorized access, and denial of service (DoS) attacks. GreyNoise detected large-scale campaigns targeting ASA login portals and Cisco IOS Telnet/SSH services, indicating potential exploitation of these vulnerabilities. The campaign is widespread and involves exploiting zero-day vulnerabilities to gain unauthenticated remote code execution on ASAs, as well as manipulating read-only memory (ROM) to persist through reboot and system upgrade. CISA and Cisco linked these ongoing attacks to the ArcaneDoor campaign, which exploited two other ASA and FTD zero-days (CVE-2024-20353 and CVE-2024-20359) to breach government networks worldwide since November 2023. CISA ordered agencies to identify all Cisco ASA and Firepower appliances on their networks, disconnect all compromised devices from the network, and patch those that show no signs of malicious activity by 12 PM EDT on September 26. CISA also ordered that agencies must permanently disconnect ASA devices that are reaching the end of support by September 30 from their networks. The U.K. National Cyber Security Centre (NCSC) confirmed that threat actors exploited the recently disclosed security flaws in Cisco firewalls to deliver previously undocumented malware families like RayInitiator and LINE VIPER. Cisco began investigating attacks on multiple government agencies in May 2025, linked to the state-sponsored ArcaneDoor campaign. The attacks targeted Cisco ASA 5500-X Series devices to implant malware, execute commands, and potentially exfiltrate data. The threat actor modified ROMMON to facilitate persistence across reboots and software upgrades. The compromised devices include ASA 5500-X Series models running specific software releases with VPN web services enabled. The Canadian Centre for Cyber Security urged organizations to update to a fixed version of Cisco ASA and FTD products to counter the threat.
Cisco IOS and IOS XE SNMP Zero-Day Exploited in Attacks
Cisco has released security updates to address a high-severity zero-day vulnerability (CVE-2025-20352) in Cisco IOS and IOS XE Software. The flaw is a stack-based buffer overflow in the Simple Network Management Protocol (SNMP) subsystem, actively exploited in attacks. This vulnerability allows authenticated, remote attackers to cause denial-of-service (DoS) conditions or gain root control of affected systems. The vulnerability impacts all devices with SNMP enabled, including specific Cisco devices running Meraki CS 17 and earlier. Cisco advises customers to upgrade to a fixed software release, specifically Cisco IOS XE Software Release 17.15.4a, to remediate the vulnerability. Temporary mitigation involves limiting SNMP access to trusted users and disabling the affected Object Identifiers (OIDs) on devices. Additionally, Cisco patched 13 other security vulnerabilities, including two with available proof-of-concept exploit code. Cisco also released patches for 14 vulnerabilities in IOS and IOS XE, including eight high-severity vulnerabilities. Proof-of-concept exploit code exists for two of the vulnerabilities, but exploitation is not confirmed. Three additional medium-severity bugs affect Cisco’s SD-WAN vEdge, Access Point, and Wireless Access Point (AP) software.
Supermicro BMC Firmware Vulnerabilities Allow Firmware Tampering
Two medium-severity vulnerabilities in Supermicro Baseboard Management Controller (BMC) firmware allow attackers to bypass firmware verification and update the system with malicious firmware. These vulnerabilities, CVE-2025-7937 and CVE-2025-6198, exploit flaws in the cryptographic signature verification process. The vulnerabilities affect the Root of Trust (RoT) security feature, potentially allowing attackers to gain persistent control over the BMC system and the main server OS. The issues were discovered by Binarly, a firmware security company. Supermicro has released firmware fixes for impacted models, and Binarly has released proof-of-concept exploits for both vulnerabilities. CVE-2025-7937 is a bypass for a previously disclosed vulnerability, CVE-2024-10237, which was reported by NVIDIA. CVE-2025-6198 bypasses the BMC RoT security feature, raising concerns about the reuse of cryptographic signing keys.
Command injection flaw in Libraesva ESG exploited by state actors
Libraesva has released an emergency update for its Email Security Gateway (ESG) solution to address a command injection vulnerability (CVE-2025-59689). This flaw, exploited by a state-sponsored actor, allows arbitrary shell command execution via a crafted email attachment. The vulnerability affects all versions from 4.5 onwards and has been patched in versions 5.0.31, 5.1.20, 5.2.31, 5.3.16, 5.4.8, and 5.5.7. The exploit was discovered and patched within 17 hours of detection. The vulnerability is triggered by improper sanitization of compressed archive formats, enabling non-privileged users to execute arbitrary commands. The patch includes a sanitization fix, automated scans for indicators of compromise, and a self-assessment module to verify the update's application. The vulnerability has a CVSS score of 6.1, indicating medium severity. Libraesva has identified one confirmed incident of abuse by a foreign hostile state entity. Customers using versions below 5.0 must upgrade manually to a supported release, as they have reached end-of-life and will not receive a patch for CVE-2025-59689.