CVE-2025-42874: CWE-405: Asymmetric Resource Consumption in SAP_SE SAP NetWeaver (remote service for Xcelsius)
SAP NetWeaver remote service for Xcelsius allows an attacker with network access and high privileges to execute arbitrary code on the affected system due to insufficient input validation and improper handling of remote method calls. Exploitation does not require user interaction and could lead to service disruption or unauthorized system control. This has high impact on integrity and availability, with no impact on confidentiality.
AI Analysis
Technical Summary
CVE-2025-42874 is a vulnerability in SAP NetWeaver's remote service for Xcelsius, specifically impacting versions 7.50 of several BI components (BI-BASE-E, BI-BASE-B, BI-IBC, BI-BASE-S, BIWEBAPP). The root cause is insufficient input validation combined with improper handling of remote method calls, which allows an attacker possessing high privileges and network access to execute arbitrary code remotely. This asymmetric resource consumption vulnerability (CWE-405) can be exploited without any user interaction, increasing the risk of automated or remote attacks. The attacker can disrupt services or gain unauthorized control over the affected system, severely impacting system integrity and availability. Confidentiality is not affected, indicating no direct data leakage risk. The CVSS v3.1 base score is 7.9, reflecting high impact and complexity due to the need for high privileges and network access. No public exploits are known yet, but the vulnerability's nature and affected product's widespread use in enterprise environments make it a critical concern. SAP NetWeaver is a core platform for many business intelligence and enterprise applications, so exploitation could disrupt critical business operations.
Potential Impact
For European organizations, the impact of CVE-2025-42874 could be significant, especially for those relying heavily on SAP NetWeaver BI components for business intelligence and enterprise resource planning. Successful exploitation could lead to unauthorized system control, potentially allowing attackers to disrupt critical services or manipulate data integrity. This could result in operational downtime, financial losses, and damage to organizational reputation. The lack of confidentiality impact reduces the risk of data breaches, but integrity and availability impacts can still cause severe business disruption. Industries such as manufacturing, finance, utilities, and public sector entities in Europe that use SAP NetWeaver extensively are particularly vulnerable. Given the high privileges required, insider threats or compromised administrative accounts could be leveraged to exploit this vulnerability. The absence of user interaction requirement means automated attacks could be feasible once exploit code becomes available.
Mitigation Recommendations
1. Monitor SAP and related security advisories closely and apply official patches or updates for SAP NetWeaver 7.50 BI components as soon as they are released. 2. Restrict network access to the SAP NetWeaver remote service for Xcelsius by implementing strict firewall rules and network segmentation to limit exposure only to trusted administrative hosts. 3. Enforce the principle of least privilege by reviewing and minimizing high-privilege accounts that have network access to the vulnerable service. 4. Enable detailed logging and monitoring of remote method calls and unusual resource consumption patterns to detect potential exploitation attempts early. 5. Conduct regular security audits and penetration testing focused on SAP NetWeaver environments to identify and remediate configuration weaknesses. 6. Consider deploying application-layer firewalls or intrusion prevention systems capable of detecting anomalous SAP protocol activity. 7. Educate SAP administrators about this vulnerability and ensure they follow secure configuration and access management best practices. 8. Prepare incident response plans specifically addressing potential SAP NetWeaver compromise scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Italy, Spain, Sweden
CVE-2025-42874: CWE-405: Asymmetric Resource Consumption in SAP_SE SAP NetWeaver (remote service for Xcelsius)
Description
SAP NetWeaver remote service for Xcelsius allows an attacker with network access and high privileges to execute arbitrary code on the affected system due to insufficient input validation and improper handling of remote method calls. Exploitation does not require user interaction and could lead to service disruption or unauthorized system control. This has high impact on integrity and availability, with no impact on confidentiality.
AI-Powered Analysis
Technical Analysis
CVE-2025-42874 is a vulnerability in SAP NetWeaver's remote service for Xcelsius, specifically impacting versions 7.50 of several BI components (BI-BASE-E, BI-BASE-B, BI-IBC, BI-BASE-S, BIWEBAPP). The root cause is insufficient input validation combined with improper handling of remote method calls, which allows an attacker possessing high privileges and network access to execute arbitrary code remotely. This asymmetric resource consumption vulnerability (CWE-405) can be exploited without any user interaction, increasing the risk of automated or remote attacks. The attacker can disrupt services or gain unauthorized control over the affected system, severely impacting system integrity and availability. Confidentiality is not affected, indicating no direct data leakage risk. The CVSS v3.1 base score is 7.9, reflecting high impact and complexity due to the need for high privileges and network access. No public exploits are known yet, but the vulnerability's nature and affected product's widespread use in enterprise environments make it a critical concern. SAP NetWeaver is a core platform for many business intelligence and enterprise applications, so exploitation could disrupt critical business operations.
Potential Impact
For European organizations, the impact of CVE-2025-42874 could be significant, especially for those relying heavily on SAP NetWeaver BI components for business intelligence and enterprise resource planning. Successful exploitation could lead to unauthorized system control, potentially allowing attackers to disrupt critical services or manipulate data integrity. This could result in operational downtime, financial losses, and damage to organizational reputation. The lack of confidentiality impact reduces the risk of data breaches, but integrity and availability impacts can still cause severe business disruption. Industries such as manufacturing, finance, utilities, and public sector entities in Europe that use SAP NetWeaver extensively are particularly vulnerable. Given the high privileges required, insider threats or compromised administrative accounts could be leveraged to exploit this vulnerability. The absence of user interaction requirement means automated attacks could be feasible once exploit code becomes available.
Mitigation Recommendations
1. Monitor SAP and related security advisories closely and apply official patches or updates for SAP NetWeaver 7.50 BI components as soon as they are released. 2. Restrict network access to the SAP NetWeaver remote service for Xcelsius by implementing strict firewall rules and network segmentation to limit exposure only to trusted administrative hosts. 3. Enforce the principle of least privilege by reviewing and minimizing high-privilege accounts that have network access to the vulnerable service. 4. Enable detailed logging and monitoring of remote method calls and unusual resource consumption patterns to detect potential exploitation attempts early. 5. Conduct regular security audits and penetration testing focused on SAP NetWeaver environments to identify and remediate configuration weaknesses. 6. Consider deploying application-layer firewalls or intrusion prevention systems capable of detecting anomalous SAP protocol activity. 7. Educate SAP administrators about this vulnerability and ensure they follow secure configuration and access management best practices. 8. Prepare incident response plans specifically addressing potential SAP NetWeaver compromise scenarios.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:17.023Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69378a890af42da4c56f96bc
Added to database: 12/9/2025, 2:33:45 AM
Last enriched: 12/16/2025, 4:59:14 AM
Last updated: 2/4/2026, 4:08:57 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1791: CWE-434 Unrestricted Upload of File with Dangerous Type in Hillstone Networks Operation and Maintenance Security Gateway
LowCVE-2026-1835: Cross-Site Request Forgery in lcg0124 BootDo
MediumCVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.