Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42875: CWE-306: Missing Authentication for Critical Function in SAP_SE SAP NetWeaver Internet Communication Framework

0
Medium
VulnerabilityCVE-2025-42875cvecve-2025-42875cwe-306
Published: Tue Dec 09 2025 (12/09/2025, 02:14:30 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver Internet Communication Framework

Description

The SAP Internet Communication Framework does not conduct any authentication checks for features that need user identification allowing an attacker to reuse authorization tokens, violating secure authentication practices causing low impact on Confidentiality, Integrity and Availability of the application.

AI-Powered Analysis

AILast updated: 12/16/2025, 05:03:40 UTC

Technical Analysis

CVE-2025-42875 identifies a vulnerability in the SAP NetWeaver Internet Communication Framework, specifically related to missing authentication for critical functions (CWE-306). The flaw arises because the framework does not perform adequate authentication checks on certain features that require user identification, allowing attackers to reuse authorization tokens improperly. This token reuse violates secure authentication principles and can lead to unauthorized access or actions within the SAP environment. The vulnerability affects a broad range of SAP_BASIS versions from 700 through 758, indicating a long-standing issue across multiple releases. The CVSS 3.1 score of 6.6 (AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L) indicates that the attack can be performed remotely over the network with low attack complexity but requires high privileges, no user interaction, and has a scope change affecting confidentiality, integrity, and availability at a low level. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to organizations relying on SAP NetWeaver for critical business processes. The missing authentication checks could allow attackers with existing privileged access to escalate their capabilities or perform unauthorized operations, potentially leading to data leakage, data manipulation, or service disruption. The vulnerability underscores the importance of robust authentication mechanisms within enterprise communication frameworks, especially in complex ERP environments like SAP.

Potential Impact

For European organizations, the impact of CVE-2025-42875 can be significant in environments where SAP NetWeaver is a core component of enterprise resource planning and business operations. The vulnerability allows attackers with high privileges to bypass authentication controls on critical functions, potentially leading to unauthorized data access, modification, or disruption of business processes. Although the direct impact on confidentiality, integrity, and availability is rated low, the ability to reuse authorization tokens improperly can facilitate lateral movement or privilege escalation within the SAP environment. This can undermine trust in the integrity of financial, operational, and personal data managed by SAP systems. Given SAP's widespread adoption in Europe across sectors such as manufacturing, finance, utilities, and public administration, exploitation could disrupt critical services and cause regulatory compliance issues, especially under GDPR and other data protection regulations. The lack of known exploits currently reduces immediate risk, but the vulnerability remains a concern for organizations with exposed or poorly segmented SAP infrastructure.

Mitigation Recommendations

Organizations should prioritize the following mitigation steps: 1) Monitor SAP security advisories closely and apply official patches or updates from SAP as soon as they become available for the affected SAP_BASIS versions. 2) Restrict network access to the SAP NetWeaver Internet Communication Framework components, limiting exposure to trusted internal networks and enforcing strict access controls. 3) Implement robust monitoring and logging of authorization token usage to detect anomalies indicative of token reuse or unauthorized access attempts. 4) Conduct regular audits of user privileges within SAP environments to minimize the number of users with high-level access, reducing the risk of token misuse. 5) Employ multi-factor authentication (MFA) where possible to strengthen authentication mechanisms around critical SAP functions. 6) Segment SAP environments from other corporate networks to contain potential exploitation impact. 7) Educate SAP administrators and security teams about this vulnerability and ensure incident response plans include scenarios involving token misuse. These targeted actions go beyond generic advice by focusing on SAP-specific controls and operational practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:17.023Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69378a890af42da4c56f96c0

Added to database: 12/9/2025, 2:33:45 AM

Last enriched: 12/16/2025, 5:03:40 AM

Last updated: 2/4/2026, 9:30:53 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats