Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42877: CWE-787: Out-of-bounds Write in SAP_SE SAP Web Dispatcher, Internet Communication Manager and SAP Content Server

0
High
VulnerabilityCVE-2025-42877cvecve-2025-42877cwe-787
Published: Tue Dec 09 2025 (12/09/2025, 02:14:51 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Web Dispatcher, Internet Communication Manager and SAP Content Server

Description

SAP Web Dispatcher, Internet Communication Manager (ICM), and SAP Content Server allow an unauthenticated user to exploit logical errors that lead to a memory corruption vulnerability. This results in high impact on the availability with no impact on confidentiality or integrity of the application.

AI-Powered Analysis

AILast updated: 12/16/2025, 05:04:13 UTC

Technical Analysis

CVE-2025-42877 is an out-of-bounds write vulnerability classified under CWE-787, affecting SAP SE's Web Dispatcher, Internet Communication Manager (ICM), and SAP Content Server components. The vulnerability stems from logical errors in the handling of certain requests that cause memory corruption. This memory corruption can be exploited by an unauthenticated attacker remotely, without any user interaction, to cause a denial of service (DoS) by crashing or destabilizing the affected SAP services. The affected versions include multiple SAP kernel and application service versions, notably KRNL64UC 7.53, WEBDISP 7.53, 7.54, XS_ADVANCED_RUNTIME 1.00, SAP_EXTENDED_APP_SERVICES 1, CONTSERV 7.53, and KERNEL 7.53. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches were linked at the time of reporting, and no known exploits have been observed in the wild. The vulnerability could be leveraged to disrupt SAP services critical for enterprise operations, potentially causing downtime and operational losses. SAP Web Dispatcher and ICM are often deployed as front-end components managing communication and load balancing, while SAP Content Server handles document storage, making their availability crucial for business continuity.

Potential Impact

For European organizations, the primary impact of CVE-2025-42877 is on availability, potentially causing denial of service conditions in SAP environments. Given SAP's widespread adoption across European enterprises, especially in sectors like manufacturing, finance, utilities, and public administration, disruption of SAP Web Dispatcher, ICM, or Content Server services could halt critical business processes, delay transactions, and impair document management workflows. This could lead to operational downtime, financial losses, and reputational damage. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data manipulation are not direct concerns. However, service unavailability in critical infrastructure or large enterprises could have cascading effects, including regulatory compliance issues and impact on supply chains. The lack of required authentication and user interaction increases the risk of exploitation, especially if vulnerable SAP services are exposed to untrusted networks or insufficiently segmented internal networks.

Mitigation Recommendations

Organizations should prioritize the following mitigations: 1) Monitor SAP security advisories closely and apply official patches or updates as soon as they become available for the affected SAP components and versions. 2) Restrict network access to SAP Web Dispatcher, ICM, and Content Server services by implementing strict firewall rules and network segmentation to limit exposure to trusted internal networks only. 3) Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics capable of detecting anomalous traffic patterns targeting SAP services. 4) Conduct regular security assessments and penetration testing focused on SAP environments to identify potential exposure and misconfigurations. 5) Harden SAP configurations by disabling unnecessary services and interfaces that could be exploited. 6) Implement robust monitoring and alerting for SAP service availability and unusual memory or process behavior indicative of exploitation attempts. 7) Educate IT and security teams about the vulnerability specifics to ensure rapid response and mitigation. These steps go beyond generic advice by focusing on network-level controls, proactive monitoring, and SAP-specific hardening tailored to the affected components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:17.023Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69378a890af42da4c56f96c8

Added to database: 12/9/2025, 2:33:45 AM

Last enriched: 12/16/2025, 5:04:13 AM

Last updated: 2/7/2026, 10:08:33 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats