CVE-2025-30011: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in SAP_SE SAP Supplier Relationship Management (Live Auction Cockpit)
The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component within the affected SRM packages which allows an unauthenticated attacker to send an malicious request to the application, which could disclose the internal version details of the affected system. This vulnerability has low impact on confidentiality, with no effect on integrity and availability of the application.
AI Analysis
Technical Summary
CVE-2025-30011 is a medium-severity vulnerability affecting SAP Supplier Relationship Management (SRM) version 7.14, specifically within the Live Auction Cockpit component. This vulnerability arises from the use of a deprecated Java applet component embedded in the affected SRM packages. An unauthenticated attacker can exploit this flaw by sending a specially crafted malicious request to the Live Auction Cockpit application. Successful exploitation results in the disclosure of sensitive internal system information, specifically the internal version details of the affected SAP SRM system. The vulnerability is categorized under CWE-497, which involves the exposure of sensitive system information to an unauthorized control sphere. According to the CVSS 3.1 scoring, the vulnerability has a base score of 5.3 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality, with no effect on integrity or availability. No known exploits are currently reported in the wild, and no official patches have been published yet. The exposure of internal version details could potentially aid attackers in crafting more targeted attacks or identifying other vulnerabilities in the system, although the direct impact on system operations is limited.
Potential Impact
For European organizations using SAP SRM 7.14 with the Live Auction Cockpit, this vulnerability poses a moderate risk primarily related to information disclosure. While the direct confidentiality impact is low, the leakage of internal version details can facilitate reconnaissance activities by threat actors, enabling them to tailor subsequent attacks or exploit other vulnerabilities specific to the disclosed versions. This is particularly relevant for organizations in sectors with high reliance on SAP SRM for supplier and procurement management, such as manufacturing, automotive, pharmaceuticals, and large-scale retail. The lack of impact on integrity and availability means operational disruptions or data tampering are unlikely from this vulnerability alone. However, in the context of a multi-stage attack, this information disclosure could be a stepping stone for more severe compromises. Given the unauthenticated and network-accessible nature of the vulnerability, attackers can attempt exploitation remotely without prior access, increasing the risk surface. European organizations with complex supply chains and integrations relying on SAP SRM should be vigilant, as attackers may leverage this information to target supply chain processes or gain footholds in enterprise environments.
Mitigation Recommendations
To mitigate CVE-2025-30011, European organizations should take the following specific actions: 1) Disable or remove the deprecated Java applet component in the Live Auction Cockpit if it is not essential for business operations, as Java applets are generally deprecated and pose security risks. 2) Restrict network access to the SAP SRM Live Auction Cockpit interface by implementing network segmentation and firewall rules to limit exposure to trusted internal networks or VPN users only. 3) Monitor and log all access attempts to the Live Auction Cockpit component to detect unusual or unauthorized requests that may indicate exploitation attempts. 4) Engage with SAP support channels to obtain any forthcoming patches or security advisories related to this vulnerability and apply them promptly once available. 5) Conduct regular security assessments and penetration testing focused on SAP SRM components to identify and remediate similar information disclosure issues. 6) Educate IT and security teams about the risks associated with deprecated technologies like Java applets and encourage migration to modern, secure alternatives. 7) Implement strict access controls and authentication mechanisms around SAP SRM interfaces to reduce the attack surface, even though this vulnerability does not require authentication, limiting access reduces overall risk.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-30011: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in SAP_SE SAP Supplier Relationship Management (Live Auction Cockpit)
Description
The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component within the affected SRM packages which allows an unauthenticated attacker to send an malicious request to the application, which could disclose the internal version details of the affected system. This vulnerability has low impact on confidentiality, with no effect on integrity and availability of the application.
AI-Powered Analysis
Technical Analysis
CVE-2025-30011 is a medium-severity vulnerability affecting SAP Supplier Relationship Management (SRM) version 7.14, specifically within the Live Auction Cockpit component. This vulnerability arises from the use of a deprecated Java applet component embedded in the affected SRM packages. An unauthenticated attacker can exploit this flaw by sending a specially crafted malicious request to the Live Auction Cockpit application. Successful exploitation results in the disclosure of sensitive internal system information, specifically the internal version details of the affected SAP SRM system. The vulnerability is categorized under CWE-497, which involves the exposure of sensitive system information to an unauthorized control sphere. According to the CVSS 3.1 scoring, the vulnerability has a base score of 5.3 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality, with no effect on integrity or availability. No known exploits are currently reported in the wild, and no official patches have been published yet. The exposure of internal version details could potentially aid attackers in crafting more targeted attacks or identifying other vulnerabilities in the system, although the direct impact on system operations is limited.
Potential Impact
For European organizations using SAP SRM 7.14 with the Live Auction Cockpit, this vulnerability poses a moderate risk primarily related to information disclosure. While the direct confidentiality impact is low, the leakage of internal version details can facilitate reconnaissance activities by threat actors, enabling them to tailor subsequent attacks or exploit other vulnerabilities specific to the disclosed versions. This is particularly relevant for organizations in sectors with high reliance on SAP SRM for supplier and procurement management, such as manufacturing, automotive, pharmaceuticals, and large-scale retail. The lack of impact on integrity and availability means operational disruptions or data tampering are unlikely from this vulnerability alone. However, in the context of a multi-stage attack, this information disclosure could be a stepping stone for more severe compromises. Given the unauthenticated and network-accessible nature of the vulnerability, attackers can attempt exploitation remotely without prior access, increasing the risk surface. European organizations with complex supply chains and integrations relying on SAP SRM should be vigilant, as attackers may leverage this information to target supply chain processes or gain footholds in enterprise environments.
Mitigation Recommendations
To mitigate CVE-2025-30011, European organizations should take the following specific actions: 1) Disable or remove the deprecated Java applet component in the Live Auction Cockpit if it is not essential for business operations, as Java applets are generally deprecated and pose security risks. 2) Restrict network access to the SAP SRM Live Auction Cockpit interface by implementing network segmentation and firewall rules to limit exposure to trusted internal networks or VPN users only. 3) Monitor and log all access attempts to the Live Auction Cockpit component to detect unusual or unauthorized requests that may indicate exploitation attempts. 4) Engage with SAP support channels to obtain any forthcoming patches or security advisories related to this vulnerability and apply them promptly once available. 5) Conduct regular security assessments and penetration testing focused on SAP SRM components to identify and remediate similar information disclosure issues. 6) Educate IT and security teams about the risks associated with deprecated technologies like Java applets and encourage migration to modern, secure alternatives. 7) Implement strict access controls and authentication mechanisms around SAP SRM interfaces to reduce the attack surface, even though this vulnerability does not require authentication, limiting access reduces overall risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2025-03-13T18:03:35.488Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd5eee
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/6/2025, 6:40:32 PM
Last updated: 8/7/2025, 3:07:54 PM
Views: 22
Related Threats
CVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.