Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42874: CWE-405: Asymmetric Resource Consumption in SAP_SE SAP NetWeaver (remote service for Xcelsius)

0
High
VulnerabilityCVE-2025-42874cvecve-2025-42874cwe-405
Published: Tue Dec 09 2025 (12/09/2025, 02:14:19 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver (remote service for Xcelsius)

Description

SAP NetWeaver remote service for Xcelsius allows an attacker with network access and high privileges to execute arbitrary code on the affected system due to insufficient input validation and improper handling of remote method calls. Exploitation does not require user interaction and could lead to service disruption or unauthorized system control. This has high impact on integrity and availability, with no impact on confidentiality.

AI-Powered Analysis

AILast updated: 12/09/2025, 02:50:13 UTC

Technical Analysis

CVE-2025-42874 is a vulnerability classified under CWE-405 (Asymmetric Resource Consumption) affecting SAP NetWeaver's remote service for Xcelsius, specifically impacting versions BI-BASE-E 7.50, BI-BASE-B 7.50, BI-IBC 7.50, BI-BASE-S 7.50, and BIWEBAPP 7.50. The vulnerability stems from insufficient input validation and improper handling of remote method calls, which allows an attacker possessing high privileges and network access to execute arbitrary code remotely. This means that an attacker can send crafted requests to the vulnerable service, causing it to consume resources disproportionately and potentially leading to service disruption or unauthorized system control. The CVSS v3.1 score is 7.9 (high), reflecting the network attack vector, high privileges required, no user interaction needed, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable service. The impact primarily affects system integrity and availability, as attackers can alter system behavior or cause denial of service, but confidentiality is minimally impacted. No public exploits have been reported, and no official patches have been released at the time of publication, indicating the need for proactive defensive measures. Given SAP NetWeaver's widespread use in enterprise resource planning and business intelligence, this vulnerability poses a significant risk to organizations relying on these platforms for critical operations.

Potential Impact

For European organizations, the impact of CVE-2025-42874 is substantial due to the widespread adoption of SAP NetWeaver in sectors such as manufacturing, finance, utilities, and government. Successful exploitation could lead to unauthorized code execution, allowing attackers to disrupt business intelligence services, manipulate data processing, or cause denial of service conditions. This can result in operational downtime, loss of data integrity, and potential regulatory non-compliance, especially under GDPR where data integrity and availability are critical. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised privileged accounts, but the lack of user interaction needed increases the risk of automated or remote exploitation. The asymmetric resource consumption aspect could also be leveraged to degrade system performance, impacting business continuity. Organizations with integrated SAP BI systems must consider the cascading effects on dependent applications and services, potentially affecting supply chains and customer-facing operations.

Mitigation Recommendations

To mitigate CVE-2025-42874, organizations should first conduct an inventory of SAP NetWeaver instances, specifically identifying affected versions of BI-BASE and BIWEBAPP 7.50 components. Until official patches are released, apply strict network segmentation and access controls to limit network access to the vulnerable remote service, ensuring only trusted administrators with high privileges can reach it. Implement robust monitoring and anomaly detection focused on unusual remote method call patterns or resource consumption spikes indicative of exploitation attempts. Enforce the principle of least privilege rigorously to reduce the number of accounts with high privileges capable of exploiting this vulnerability. Additionally, review and harden SAP NetWeaver configurations to disable or restrict the remote service for Xcelsius if not required. Engage with SAP support channels to obtain any interim mitigation guidance or hotfixes. Finally, prepare incident response plans tailored to potential exploitation scenarios involving arbitrary code execution and service disruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:17.023Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69378a890af42da4c56f96bc

Added to database: 12/9/2025, 2:33:45 AM

Last enriched: 12/9/2025, 2:50:13 AM

Last updated: 12/11/2025, 2:20:12 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats