Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42875: CWE-306: Missing Authentication for Critical Function in SAP_SE SAP NetWeaver Internet Communication Framework

0
Medium
VulnerabilityCVE-2025-42875cvecve-2025-42875cwe-306
Published: Tue Dec 09 2025 (12/09/2025, 02:14:30 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver Internet Communication Framework

Description

The SAP Internet Communication Framework does not conduct any authentication checks for features that need user identification allowing an attacker to reuse authorization tokens, violating secure authentication practices causing low impact on Confidentiality, Integrity and Availability of the application.

AI-Powered Analysis

AILast updated: 12/09/2025, 02:51:22 UTC

Technical Analysis

CVE-2025-42875 identifies a vulnerability in the SAP NetWeaver Internet Communication Framework, specifically related to missing authentication for critical functions (CWE-306). The framework fails to perform necessary authentication checks on certain features that require user identification, allowing attackers to reuse authorization tokens improperly. This bypass of secure authentication mechanisms can lead to unauthorized access to sensitive functions within the SAP environment. The vulnerability affects a broad range of SAP_BASIS versions from 700 through 758, indicating a long-standing issue across multiple releases. The CVSS 3.1 score of 6.6 (AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L) indicates that the vulnerability can be exploited remotely over the network with low attack complexity but requires the attacker to have high privileges already. The scope is changed, meaning the vulnerability can affect resources beyond the initially compromised component. The impact on confidentiality, integrity, and availability is low but present, as unauthorized token reuse could lead to limited data exposure or function misuse. No user interaction is required, and no known exploits have been reported in the wild to date. This vulnerability highlights a critical lapse in authentication enforcement within SAP's Internet Communication Framework, which is a core component for integrating SAP systems with external communication protocols. Organizations relying on these SAP versions should be aware of the risk of token reuse attacks that could undermine secure access controls.

Potential Impact

For European organizations, the impact of CVE-2025-42875 is primarily related to the potential unauthorized reuse of authorization tokens within SAP NetWeaver environments. While the confidentiality, integrity, and availability impacts are rated low, the vulnerability could allow attackers with existing high privileges to escalate their access or perform unauthorized actions within critical SAP functions. This could lead to data leakage, manipulation of business processes, or disruption of services dependent on SAP systems. Given SAP's widespread use in European enterprises, especially in sectors like manufacturing, finance, utilities, and public administration, exploitation could undermine operational security and trust. The vulnerability's requirement for high privileges reduces the risk of external attackers directly exploiting it but raises concerns about insider threats or compromised privileged accounts. The lack of authentication checks also violates compliance requirements for secure access controls, potentially exposing organizations to regulatory penalties. Overall, the vulnerability could facilitate lateral movement and privilege escalation within SAP landscapes, impacting business continuity and data protection efforts in Europe.

Mitigation Recommendations

1. Apply SAP-provided patches or updates addressing CVE-2025-42875 as soon as they become available to enforce proper authentication checks in the Internet Communication Framework. 2. Restrict and tightly control privileged access to SAP systems, ensuring that only authorized personnel have high-level privileges to reduce the risk of token reuse exploitation. 3. Implement robust monitoring and logging of authorization token usage and critical function access within SAP environments to detect anomalous or repeated token reuse patterns. 4. Conduct regular audits of user privileges and session management to identify and revoke unnecessary or stale tokens and credentials. 5. Employ network segmentation and access controls to limit exposure of SAP NetWeaver components to untrusted networks. 6. Educate SAP administrators and security teams about the risks of missing authentication checks and the importance of secure token management. 7. Consider deploying additional security layers such as SAP Enterprise Threat Detection or third-party solutions that can detect suspicious activities related to token misuse. 8. Review and strengthen authentication and authorization policies within SAP to ensure multi-factor authentication and session timeouts are enforced where possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:17.023Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69378a890af42da4c56f96c0

Added to database: 12/9/2025, 2:33:45 AM

Last enriched: 12/9/2025, 2:51:22 AM

Last updated: 12/10/2025, 10:35:53 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats