Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42877: CWE-787: Out-of-bounds Write in SAP_SE SAP Web Dispatcher, Internet Communication Manager and SAP Content Server

0
High
VulnerabilityCVE-2025-42877cvecve-2025-42877cwe-787
Published: Tue Dec 09 2025 (12/09/2025, 02:14:51 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Web Dispatcher, Internet Communication Manager and SAP Content Server

Description

SAP Web Dispatcher, Internet Communication Manager (ICM), and SAP Content Server allow an unauthenticated user to exploit logical errors that lead to a memory corruption vulnerability. This results in high impact on the availability with no impact on confidentiality or integrity of the application.

AI-Powered Analysis

AILast updated: 12/09/2025, 02:49:49 UTC

Technical Analysis

CVE-2025-42877 is an out-of-bounds write vulnerability classified under CWE-787, affecting SAP Web Dispatcher, Internet Communication Manager (ICM), and SAP Content Server components. These SAP products handle critical communication and content management tasks within enterprise environments. The vulnerability stems from logical errors in the code that allow an unauthenticated attacker to write outside the bounds of allocated memory buffers. This memory corruption can cause application crashes or denial of service conditions, severely impacting system availability. The flaw affects multiple SAP components and versions, notably KRNL64UC 7.53, WEBDISP 7.53, 7.54, XS_ADVANCED_RUNTIME 1.00, SAP_EXTENDED_APP_SERVICES 1, CONTSERV 7.53, and KERNEL 7.53. Exploitation requires no privileges or user interaction and can be triggered remotely over the network, increasing the attack surface. While confidentiality and integrity remain unaffected, the availability impact can disrupt business operations relying on SAP services. No public exploits have been reported yet, but the vulnerability’s characteristics suggest it could be weaponized for denial of service attacks. The CVSS v3.1 score of 7.5 reflects the high impact on availability combined with ease of exploitation. SAP customers should monitor for patches and advisories, as none are currently linked, and apply them promptly once available. Network segmentation, traffic filtering, and monitoring for anomalous activity targeting SAP communication interfaces can help reduce risk in the interim.

Potential Impact

For European organizations, the primary impact of CVE-2025-42877 is the potential disruption of critical SAP services due to denial of service conditions caused by memory corruption. SAP Web Dispatcher and ICM are central to managing web traffic and communication for SAP applications, while SAP Content Server handles document and content storage. An outage or instability in these components can halt business processes, affecting supply chains, financial operations, and customer-facing services. Given SAP’s widespread adoption across European industries such as manufacturing, finance, utilities, and public sector, the availability impact could lead to significant operational downtime and financial losses. The lack of confidentiality or integrity impact reduces risks related to data breaches, but service interruptions alone can cause reputational damage and regulatory scrutiny, especially under GDPR mandates for service continuity. Organizations with complex SAP landscapes and high dependency on real-time data exchange are particularly vulnerable. The unauthenticated, network-based attack vector increases the likelihood of exploitation attempts, especially from opportunistic attackers or automated scanning tools. The absence of known exploits currently provides a window for proactive defense, but the threat landscape may evolve rapidly once exploit code becomes available.

Mitigation Recommendations

1. Monitor SAP Security Advisories closely and apply official patches immediately upon release to address CVE-2025-42877. 2. Implement network-level protections such as firewall rules and access control lists to restrict inbound traffic to SAP Web Dispatcher, ICM, and Content Server interfaces only to trusted sources. 3. Employ SAP’s recommended hardening guidelines to minimize exposed services and reduce attack surface. 4. Use intrusion detection and prevention systems (IDS/IPS) to detect anomalous traffic patterns or attempts to exploit memory corruption vulnerabilities targeting SAP components. 5. Conduct regular security assessments and penetration tests focused on SAP infrastructure to identify potential weaknesses. 6. Segment SAP systems from general corporate networks and limit administrative access to reduce lateral movement risks. 7. Maintain up-to-date backups and disaster recovery plans to ensure rapid restoration of services in case of denial of service incidents. 8. Educate IT and security teams on this vulnerability’s specifics to enhance monitoring and incident response capabilities. 9. Consider deploying runtime application self-protection (RASP) or memory protection technologies that can detect and block out-of-bounds memory writes in real time. 10. Collaborate with SAP support and security communities to share threat intelligence and mitigation best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:17.023Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69378a890af42da4c56f96c8

Added to database: 12/9/2025, 2:33:45 AM

Last enriched: 12/9/2025, 2:49:49 AM

Last updated: 12/10/2025, 10:49:13 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats