Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42874: CWE-405: Asymmetric Resource Consumption in SAP_SE SAP NetWeaver (remote service for Xcelsius)

0
High
VulnerabilityCVE-2025-42874cvecve-2025-42874cwe-405
Published: Tue Dec 09 2025 (12/09/2025, 02:14:19 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver (remote service for Xcelsius)

Description

SAP NetWeaver remote service for Xcelsius allows an attacker with network access and high privileges to execute arbitrary code on the affected system due to insufficient input validation and improper handling of remote method calls. Exploitation does not require user interaction and could lead to service disruption or unauthorized system control. This has high impact on integrity and availability, with no impact on confidentiality.

AI-Powered Analysis

AILast updated: 12/16/2025, 04:59:14 UTC

Technical Analysis

CVE-2025-42874 is a vulnerability in SAP NetWeaver's remote service for Xcelsius, specifically impacting versions 7.50 of several BI components (BI-BASE-E, BI-BASE-B, BI-IBC, BI-BASE-S, BIWEBAPP). The root cause is insufficient input validation combined with improper handling of remote method calls, which allows an attacker possessing high privileges and network access to execute arbitrary code remotely. This asymmetric resource consumption vulnerability (CWE-405) can be exploited without any user interaction, increasing the risk of automated or remote attacks. The attacker can disrupt services or gain unauthorized control over the affected system, severely impacting system integrity and availability. Confidentiality is not affected, indicating no direct data leakage risk. The CVSS v3.1 base score is 7.9, reflecting high impact and complexity due to the need for high privileges and network access. No public exploits are known yet, but the vulnerability's nature and affected product's widespread use in enterprise environments make it a critical concern. SAP NetWeaver is a core platform for many business intelligence and enterprise applications, so exploitation could disrupt critical business operations.

Potential Impact

For European organizations, the impact of CVE-2025-42874 could be significant, especially for those relying heavily on SAP NetWeaver BI components for business intelligence and enterprise resource planning. Successful exploitation could lead to unauthorized system control, potentially allowing attackers to disrupt critical services or manipulate data integrity. This could result in operational downtime, financial losses, and damage to organizational reputation. The lack of confidentiality impact reduces the risk of data breaches, but integrity and availability impacts can still cause severe business disruption. Industries such as manufacturing, finance, utilities, and public sector entities in Europe that use SAP NetWeaver extensively are particularly vulnerable. Given the high privileges required, insider threats or compromised administrative accounts could be leveraged to exploit this vulnerability. The absence of user interaction requirement means automated attacks could be feasible once exploit code becomes available.

Mitigation Recommendations

1. Monitor SAP and related security advisories closely and apply official patches or updates for SAP NetWeaver 7.50 BI components as soon as they are released. 2. Restrict network access to the SAP NetWeaver remote service for Xcelsius by implementing strict firewall rules and network segmentation to limit exposure only to trusted administrative hosts. 3. Enforce the principle of least privilege by reviewing and minimizing high-privilege accounts that have network access to the vulnerable service. 4. Enable detailed logging and monitoring of remote method calls and unusual resource consumption patterns to detect potential exploitation attempts early. 5. Conduct regular security audits and penetration testing focused on SAP NetWeaver environments to identify and remediate configuration weaknesses. 6. Consider deploying application-layer firewalls or intrusion prevention systems capable of detecting anomalous SAP protocol activity. 7. Educate SAP administrators about this vulnerability and ensure they follow secure configuration and access management best practices. 8. Prepare incident response plans specifically addressing potential SAP NetWeaver compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:17.023Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69378a890af42da4c56f96bc

Added to database: 12/9/2025, 2:33:45 AM

Last enriched: 12/16/2025, 4:59:14 AM

Last updated: 2/4/2026, 4:08:57 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats