Exploited Critical Vulnerability CVE-2025-42957 in SAP S/4HANA

Published:

spot_img

Sep 05, 2025Ravie LakshmananVulnerability / Enterprise Security

Emerging Security Threat in SAP S/4HANA

A significant security vulnerability affecting SAP S/4HANA, a leading Enterprise Resource Planning (ERP) software, has recently come to light. This particular flaw, identified as CVE-2025-42957, has been found to be actively exploited in the wild. With a severe CVSS score of 9.9, this command injection vulnerability poses a critical risk for organizations utilizing the software.

Details of the Vulnerability

SAP has addressed this vulnerability in their monthly updates. According to the NIST National Vulnerability Database (NVD), the issue allows attackers with user privileges to exploit a vulnerability present in a specific function module exposed via RFC (Remote Function Call). This can enable the injection of arbitrary ABAP code into the system and bypass essential authorization checks, compromising the security of the entire system.

Potential Impacts of the Exploit

Successful exploitation of CVE-2025-42957 can lead to a full system compromise, threatening the confidentiality, integrity, and availability of the SAP environment. Attackers can gain the ability to manipulate the SAP database, create superuser accounts with SAP_ALL privileges, extract password hashes, and even modify critical business processes. The implications are vast, as organizations could face severe operational disruptions and financial losses.

Active Exploitation Observed

On Thursday, SecurityBridge Threat Research Labs released an alert indicating that they have observed active exploitation of the vulnerability. This issue impacts both on-premise and Private Cloud editions of SAP S/4HANA. According to the report, the exploitation of this flaw only requires access to a low-privileged user account, meaning a complete compromise can be achieved with minimal effort. This vulnerability opens the door to potential fraud, data theft, espionage, or even ransomware installation.

Immediate Action Required

While there have been no widespread attacks reported yet, the potential for malicious exploitation exists. SecurityBridge cautions that threat actors are already equipped with the knowledge to exploit the vulnerability, and reverse-engineering the patch for this flaw is a relatively straightforward task. Accordingly, organizations are urged to implement the latest patches promptly, monitor logs for any suspicious RFC calls or unauthorized admin users, and ensure proper segmentation and backup processes are in place.

To mitigate risks associated with this vulnerability, organizations should consider implementing SAP UCON to restrict RFC usage. Additionally, it is advisable to review and restrict access to authorization object S_DMIS activity 02 in order to enhance security measures.

Industry Response

In a related development, cybersecurity vendor Pathlock reported detecting unusual activity that aligns with attempts to exploit CVE-2025-42957. Pathlock warns that any organization that has not yet applied SAP’s August 2025 security notes is exposed to potential threats.

spot_img

Related articles

Recent articles

Hacktivist Disrupts White Supremacist Websites in Live Conference Action

At a recent Chaos Communication Congress in Hamburg, Germany, a hacktivist known as Martha Root made headlines by exposing and...

Jumeirah Beach 1 Set to Reopen in Dubai with Major Upgrades

Jumeirah Beach 1 Development Set for February Reopening The highly anticipated Jumeirah Beach 1 development in Dubai is gearing up for a public reopening in...

UK Launches £210M Cybersecurity Overhaul Amid Severe Digital Threats

UK Government Addresses Cybersecurity Crisis with New Action Plan An Urgent Response to Cyber Threats The UK Department for Science, Innovation, and Technology has unveiled its...

Understanding Proxy Servers: A Comprehensive Guide to Types, Uses, and Benefits

Understanding Proxy Servers: Their Role, Types, and Benefits In today’s digital landscape, the concept of a proxy server is increasingly relevant, particularly in discussions surrounding...