Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42885: CWE-306: Missing Authentication for Critical Function in SAP_SE SAP HANA 2.0 (hdbrss)

0
Medium
VulnerabilityCVE-2025-42885cvecve-2025-42885cwe-306
Published: Tue Nov 11 2025 (11/11/2025, 00:14:17 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP HANA 2.0 (hdbrss)

Description

Due to missing authentication, SAP HANA 2.0 (hdbrss) allows an unauthenticated attacker to call a remote-enabled function that will enable them to view information. As a result, it has a low impact on the confidentiality but no impact on the integrity and availability of the system.

AI-Powered Analysis

AILast updated: 11/18/2025, 04:47:21 UTC

Technical Analysis

CVE-2025-42885 is a vulnerability identified in SAP HANA 2.0 (hdbrss) related to CWE-306: Missing Authentication for a Critical Function. The vulnerability arises because a remote-enabled function within the hdbrss component lacks proper authentication controls, allowing unauthenticated attackers to invoke it remotely. This flaw enables attackers to access certain information that should otherwise be protected, resulting in a confidentiality impact. However, the vulnerability does not affect the integrity or availability of the system. The CVSS v3.1 base score is 5.8, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) indicating that the vulnerability affects resources beyond the initially vulnerable component. The absence of authentication means that any attacker with network access to the SAP HANA instance can exploit this vulnerability without needing credentials or user involvement. Although no known exploits have been reported in the wild yet, the potential for information disclosure makes this a significant concern for organizations relying on SAP HANA 2.0. The vulnerability was reserved in April 2025 and published in November 2025, but no official patches are currently linked, suggesting that organizations should monitor SAP advisories closely for updates. The nature of the vulnerability requires careful network segmentation and access control to mitigate risk until patches are available.

Potential Impact

For European organizations, the impact primarily concerns the confidentiality of sensitive data managed within SAP HANA 2.0 environments. Given SAP HANA's role in enterprise resource planning, financial systems, and critical business operations, unauthorized information disclosure could lead to competitive disadvantage, regulatory non-compliance (e.g., GDPR), and erosion of customer trust. Although the vulnerability does not compromise data integrity or system availability, the exposure of sensitive information could facilitate further attacks or insider threats. The medium severity score reflects that while the impact is limited to confidentiality, the ease of exploitation without authentication increases risk. Organizations in sectors such as finance, manufacturing, and public administration—where SAP HANA is widely deployed—are particularly at risk. Additionally, the cross-scope nature of the vulnerability means that attackers might leverage this flaw to gain insights into other connected systems or data repositories, amplifying potential damage.

Mitigation Recommendations

1. Monitor SAP security advisories regularly for official patches addressing CVE-2025-42885 and apply them promptly once available. 2. Implement strict network segmentation to limit access to SAP HANA 2.0 (hdbrss) services only to trusted internal hosts and administrators. 3. Employ firewall rules and access control lists (ACLs) to restrict inbound traffic to the SAP HANA instance, minimizing exposure to untrusted networks. 4. Enable and review detailed logging and monitoring on SAP HANA to detect anomalous or unauthorized access attempts to the hdbrss component. 5. Conduct internal audits to identify any unnecessary remote-enabled functions and disable or restrict them where possible. 6. Use SAP’s built-in security features to enforce authentication and authorization policies, compensating for the missing authentication in this specific function until patched. 7. Educate IT and security teams about this vulnerability to ensure rapid incident response if exploitation attempts are detected. 8. Consider deploying network intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious SAP HANA traffic patterns related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:19.826Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912870714bc3e00ba6f3bce

Added to database: 11/11/2025, 12:44:55 AM

Last enriched: 11/18/2025, 4:47:21 AM

Last updated: 1/7/2026, 5:22:46 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats