CVE-2025-42874: CWE-405: Asymmetric Resource Consumption in SAP_SE SAP NetWeaver (remote service for Xcelsius)
SAP NetWeaver remote service for Xcelsius allows an attacker with network access and high privileges to execute arbitrary code on the affected system due to insufficient input validation and improper handling of remote method calls. Exploitation does not require user interaction and could lead to service disruption or unauthorized system control. This has high impact on integrity and availability, with no impact on confidentiality.
AI Analysis
Technical Summary
CVE-2025-42874 is a vulnerability classified under CWE-405 (Asymmetric Resource Consumption) affecting SAP NetWeaver's remote service for Xcelsius, specifically impacting versions BI-BASE-E 7.50, BI-BASE-B 7.50, BI-IBC 7.50, BI-BASE-S 7.50, and BIWEBAPP 7.50. The vulnerability stems from insufficient input validation and improper handling of remote method calls, which allows an attacker possessing high privileges and network access to execute arbitrary code remotely. This means that an attacker can send crafted requests to the vulnerable service, causing it to consume resources disproportionately and potentially leading to service disruption or unauthorized system control. The CVSS v3.1 score is 7.9 (high), reflecting the network attack vector, high privileges required, no user interaction needed, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable service. The impact primarily affects system integrity and availability, as attackers can alter system behavior or cause denial of service, but confidentiality is minimally impacted. No public exploits have been reported, and no official patches have been released at the time of publication, indicating the need for proactive defensive measures. Given SAP NetWeaver's widespread use in enterprise resource planning and business intelligence, this vulnerability poses a significant risk to organizations relying on these platforms for critical operations.
Potential Impact
For European organizations, the impact of CVE-2025-42874 is substantial due to the widespread adoption of SAP NetWeaver in sectors such as manufacturing, finance, utilities, and government. Successful exploitation could lead to unauthorized code execution, allowing attackers to disrupt business intelligence services, manipulate data processing, or cause denial of service conditions. This can result in operational downtime, loss of data integrity, and potential regulatory non-compliance, especially under GDPR where data integrity and availability are critical. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised privileged accounts, but the lack of user interaction needed increases the risk of automated or remote exploitation. The asymmetric resource consumption aspect could also be leveraged to degrade system performance, impacting business continuity. Organizations with integrated SAP BI systems must consider the cascading effects on dependent applications and services, potentially affecting supply chains and customer-facing operations.
Mitigation Recommendations
To mitigate CVE-2025-42874, organizations should first conduct an inventory of SAP NetWeaver instances, specifically identifying affected versions of BI-BASE and BIWEBAPP 7.50 components. Until official patches are released, apply strict network segmentation and access controls to limit network access to the vulnerable remote service, ensuring only trusted administrators with high privileges can reach it. Implement robust monitoring and anomaly detection focused on unusual remote method call patterns or resource consumption spikes indicative of exploitation attempts. Enforce the principle of least privilege rigorously to reduce the number of accounts with high privileges capable of exploiting this vulnerability. Additionally, review and harden SAP NetWeaver configurations to disable or restrict the remote service for Xcelsius if not required. Engage with SAP support channels to obtain any interim mitigation guidance or hotfixes. Finally, prepare incident response plans tailored to potential exploitation scenarios involving arbitrary code execution and service disruption.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-42874: CWE-405: Asymmetric Resource Consumption in SAP_SE SAP NetWeaver (remote service for Xcelsius)
Description
SAP NetWeaver remote service for Xcelsius allows an attacker with network access and high privileges to execute arbitrary code on the affected system due to insufficient input validation and improper handling of remote method calls. Exploitation does not require user interaction and could lead to service disruption or unauthorized system control. This has high impact on integrity and availability, with no impact on confidentiality.
AI-Powered Analysis
Technical Analysis
CVE-2025-42874 is a vulnerability classified under CWE-405 (Asymmetric Resource Consumption) affecting SAP NetWeaver's remote service for Xcelsius, specifically impacting versions BI-BASE-E 7.50, BI-BASE-B 7.50, BI-IBC 7.50, BI-BASE-S 7.50, and BIWEBAPP 7.50. The vulnerability stems from insufficient input validation and improper handling of remote method calls, which allows an attacker possessing high privileges and network access to execute arbitrary code remotely. This means that an attacker can send crafted requests to the vulnerable service, causing it to consume resources disproportionately and potentially leading to service disruption or unauthorized system control. The CVSS v3.1 score is 7.9 (high), reflecting the network attack vector, high privileges required, no user interaction needed, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable service. The impact primarily affects system integrity and availability, as attackers can alter system behavior or cause denial of service, but confidentiality is minimally impacted. No public exploits have been reported, and no official patches have been released at the time of publication, indicating the need for proactive defensive measures. Given SAP NetWeaver's widespread use in enterprise resource planning and business intelligence, this vulnerability poses a significant risk to organizations relying on these platforms for critical operations.
Potential Impact
For European organizations, the impact of CVE-2025-42874 is substantial due to the widespread adoption of SAP NetWeaver in sectors such as manufacturing, finance, utilities, and government. Successful exploitation could lead to unauthorized code execution, allowing attackers to disrupt business intelligence services, manipulate data processing, or cause denial of service conditions. This can result in operational downtime, loss of data integrity, and potential regulatory non-compliance, especially under GDPR where data integrity and availability are critical. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised privileged accounts, but the lack of user interaction needed increases the risk of automated or remote exploitation. The asymmetric resource consumption aspect could also be leveraged to degrade system performance, impacting business continuity. Organizations with integrated SAP BI systems must consider the cascading effects on dependent applications and services, potentially affecting supply chains and customer-facing operations.
Mitigation Recommendations
To mitigate CVE-2025-42874, organizations should first conduct an inventory of SAP NetWeaver instances, specifically identifying affected versions of BI-BASE and BIWEBAPP 7.50 components. Until official patches are released, apply strict network segmentation and access controls to limit network access to the vulnerable remote service, ensuring only trusted administrators with high privileges can reach it. Implement robust monitoring and anomaly detection focused on unusual remote method call patterns or resource consumption spikes indicative of exploitation attempts. Enforce the principle of least privilege rigorously to reduce the number of accounts with high privileges capable of exploiting this vulnerability. Additionally, review and harden SAP NetWeaver configurations to disable or restrict the remote service for Xcelsius if not required. Engage with SAP support channels to obtain any interim mitigation guidance or hotfixes. Finally, prepare incident response plans tailored to potential exploitation scenarios involving arbitrary code execution and service disruption.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:17.023Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69378a890af42da4c56f96bc
Added to database: 12/9/2025, 2:33:45 AM
Last enriched: 12/9/2025, 2:50:13 AM
Last updated: 12/11/2025, 2:20:12 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67720: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Mayuri-Chan pyrofork
MediumCVE-2025-67719: CWE-620: Unverified Password Change in ibexa user
HighCVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0
MediumCVE-2025-67511: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in aliasrobotics cai
CriticalCVE-2025-67713: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in miniflux v2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.