CVE-2025-42877: CWE-787: Out-of-bounds Write in SAP_SE SAP Web Dispatcher, Internet Communication Manager and SAP Content Server
SAP Web Dispatcher, Internet Communication Manager (ICM), and SAP Content Server allow an unauthenticated user to exploit logical errors that lead to a memory corruption vulnerability. This results in high impact on the availability with no impact on confidentiality or integrity of the application.
AI Analysis
Technical Summary
CVE-2025-42877 is an out-of-bounds write vulnerability classified under CWE-787, affecting SAP SE's Web Dispatcher, Internet Communication Manager (ICM), and SAP Content Server components. The vulnerability stems from logical errors in the handling of certain requests that cause memory corruption. This memory corruption can be exploited by an unauthenticated attacker remotely, without any user interaction, to cause a denial of service (DoS) by crashing or destabilizing the affected SAP services. The affected versions include multiple SAP kernel and application service versions, notably KRNL64UC 7.53, WEBDISP 7.53, 7.54, XS_ADVANCED_RUNTIME 1.00, SAP_EXTENDED_APP_SERVICES 1, CONTSERV 7.53, and KERNEL 7.53. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches were linked at the time of reporting, and no known exploits have been observed in the wild. The vulnerability could be leveraged to disrupt SAP services critical for enterprise operations, potentially causing downtime and operational losses. SAP Web Dispatcher and ICM are often deployed as front-end components managing communication and load balancing, while SAP Content Server handles document storage, making their availability crucial for business continuity.
Potential Impact
For European organizations, the primary impact of CVE-2025-42877 is on availability, potentially causing denial of service conditions in SAP environments. Given SAP's widespread adoption across European enterprises, especially in sectors like manufacturing, finance, utilities, and public administration, disruption of SAP Web Dispatcher, ICM, or Content Server services could halt critical business processes, delay transactions, and impair document management workflows. This could lead to operational downtime, financial losses, and reputational damage. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data manipulation are not direct concerns. However, service unavailability in critical infrastructure or large enterprises could have cascading effects, including regulatory compliance issues and impact on supply chains. The lack of required authentication and user interaction increases the risk of exploitation, especially if vulnerable SAP services are exposed to untrusted networks or insufficiently segmented internal networks.
Mitigation Recommendations
Organizations should prioritize the following mitigations: 1) Monitor SAP security advisories closely and apply official patches or updates as soon as they become available for the affected SAP components and versions. 2) Restrict network access to SAP Web Dispatcher, ICM, and Content Server services by implementing strict firewall rules and network segmentation to limit exposure to trusted internal networks only. 3) Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics capable of detecting anomalous traffic patterns targeting SAP services. 4) Conduct regular security assessments and penetration testing focused on SAP environments to identify potential exposure and misconfigurations. 5) Harden SAP configurations by disabling unnecessary services and interfaces that could be exploited. 6) Implement robust monitoring and alerting for SAP service availability and unusual memory or process behavior indicative of exploitation attempts. 7) Educate IT and security teams about the vulnerability specifics to ensure rapid response and mitigation. These steps go beyond generic advice by focusing on network-level controls, proactive monitoring, and SAP-specific hardening tailored to the affected components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-42877: CWE-787: Out-of-bounds Write in SAP_SE SAP Web Dispatcher, Internet Communication Manager and SAP Content Server
Description
SAP Web Dispatcher, Internet Communication Manager (ICM), and SAP Content Server allow an unauthenticated user to exploit logical errors that lead to a memory corruption vulnerability. This results in high impact on the availability with no impact on confidentiality or integrity of the application.
AI-Powered Analysis
Technical Analysis
CVE-2025-42877 is an out-of-bounds write vulnerability classified under CWE-787, affecting SAP SE's Web Dispatcher, Internet Communication Manager (ICM), and SAP Content Server components. The vulnerability stems from logical errors in the handling of certain requests that cause memory corruption. This memory corruption can be exploited by an unauthenticated attacker remotely, without any user interaction, to cause a denial of service (DoS) by crashing or destabilizing the affected SAP services. The affected versions include multiple SAP kernel and application service versions, notably KRNL64UC 7.53, WEBDISP 7.53, 7.54, XS_ADVANCED_RUNTIME 1.00, SAP_EXTENDED_APP_SERVICES 1, CONTSERV 7.53, and KERNEL 7.53. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches were linked at the time of reporting, and no known exploits have been observed in the wild. The vulnerability could be leveraged to disrupt SAP services critical for enterprise operations, potentially causing downtime and operational losses. SAP Web Dispatcher and ICM are often deployed as front-end components managing communication and load balancing, while SAP Content Server handles document storage, making their availability crucial for business continuity.
Potential Impact
For European organizations, the primary impact of CVE-2025-42877 is on availability, potentially causing denial of service conditions in SAP environments. Given SAP's widespread adoption across European enterprises, especially in sectors like manufacturing, finance, utilities, and public administration, disruption of SAP Web Dispatcher, ICM, or Content Server services could halt critical business processes, delay transactions, and impair document management workflows. This could lead to operational downtime, financial losses, and reputational damage. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data manipulation are not direct concerns. However, service unavailability in critical infrastructure or large enterprises could have cascading effects, including regulatory compliance issues and impact on supply chains. The lack of required authentication and user interaction increases the risk of exploitation, especially if vulnerable SAP services are exposed to untrusted networks or insufficiently segmented internal networks.
Mitigation Recommendations
Organizations should prioritize the following mitigations: 1) Monitor SAP security advisories closely and apply official patches or updates as soon as they become available for the affected SAP components and versions. 2) Restrict network access to SAP Web Dispatcher, ICM, and Content Server services by implementing strict firewall rules and network segmentation to limit exposure to trusted internal networks only. 3) Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics capable of detecting anomalous traffic patterns targeting SAP services. 4) Conduct regular security assessments and penetration testing focused on SAP environments to identify potential exposure and misconfigurations. 5) Harden SAP configurations by disabling unnecessary services and interfaces that could be exploited. 6) Implement robust monitoring and alerting for SAP service availability and unusual memory or process behavior indicative of exploitation attempts. 7) Educate IT and security teams about the vulnerability specifics to ensure rapid response and mitigation. These steps go beyond generic advice by focusing on network-level controls, proactive monitoring, and SAP-specific hardening tailored to the affected components.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:17.023Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69378a890af42da4c56f96c8
Added to database: 12/9/2025, 2:33:45 AM
Last enriched: 12/16/2025, 5:04:13 AM
Last updated: 2/7/2026, 10:08:33 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.