CVE-2025-42897: CWE-522: Insufficiently Protected Credentials in SAP_SE SAP Business One (SLD)
Due to information disclosure vulnerability in anonymous API provided by SAP Business One (SLD), an attacker with normal user access could gain access to unauthorized information. As a result, it has a low impact on the confidentiality of the application but no impact on the integrity and availability.
AI Analysis
Technical Summary
CVE-2025-42897 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) found in the SAP Business One System Landscape Directory (SLD) component, specifically affecting versions B1_ON_HANA 10.0 and SAP-M-BO 10.0. The flaw arises from an information disclosure issue in an anonymous API endpoint, which allows an attacker possessing normal user-level access to retrieve unauthorized information. This vulnerability does not require user interaction and can be exploited remotely over the network with low attack complexity. The impact is limited to confidentiality, as the attacker can gain access to sensitive data but cannot alter or disrupt system integrity or availability. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the vulnerability's ease of exploitation (network vector, no privileges required) but limited impact scope. No known exploits have been reported in the wild, and SAP has not yet published patches or mitigation guidance. The vulnerability highlights a weakness in how credentials or sensitive information are protected within the anonymous API, potentially exposing business-critical data to unauthorized users. Organizations using SAP Business One 10.0 should assess their exposure and implement compensating controls until official patches are available.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive business information managed within SAP Business One environments. While the impact is limited to confidentiality and does not affect system integrity or availability, the exposure of credentials or sensitive configuration data could facilitate further attacks or data breaches. Industries such as manufacturing, retail, and professional services that rely heavily on SAP Business One for ERP functions may face risks related to intellectual property theft, compliance violations (e.g., GDPR), and reputational damage. The medium severity score indicates that while the threat is not critical, it should not be ignored, especially in environments where SAP Business One is integrated with other critical business systems. The lack of known exploits reduces immediate risk but also means organizations must proactively monitor and prepare for potential exploitation attempts. Failure to address this vulnerability could lead to unauthorized data access, undermining trust and potentially triggering regulatory scrutiny in Europe.
Mitigation Recommendations
1. Restrict network access to the SAP Business One SLD anonymous API by implementing strict firewall rules and network segmentation to limit exposure to trusted users and systems only. 2. Enforce strong authentication and authorization controls around SAP Business One components, ensuring that anonymous or low-privilege access is minimized or disabled where possible. 3. Monitor logs and network traffic for unusual or unauthorized access attempts to the SLD API, employing anomaly detection tools to identify potential exploitation. 4. Engage with SAP support channels to obtain official patches or security advisories as soon as they are released and apply them promptly. 5. Conduct regular security assessments and penetration tests focusing on SAP Business One environments to identify and remediate similar weaknesses. 6. Educate system administrators and security teams about this vulnerability and the importance of protecting API endpoints, especially those that are anonymous or publicly accessible. 7. Consider deploying Web Application Firewalls (WAFs) or API gateways with strict access policies to add an additional layer of defense around SAP APIs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-42897: CWE-522: Insufficiently Protected Credentials in SAP_SE SAP Business One (SLD)
Description
Due to information disclosure vulnerability in anonymous API provided by SAP Business One (SLD), an attacker with normal user access could gain access to unauthorized information. As a result, it has a low impact on the confidentiality of the application but no impact on the integrity and availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-42897 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) found in the SAP Business One System Landscape Directory (SLD) component, specifically affecting versions B1_ON_HANA 10.0 and SAP-M-BO 10.0. The flaw arises from an information disclosure issue in an anonymous API endpoint, which allows an attacker possessing normal user-level access to retrieve unauthorized information. This vulnerability does not require user interaction and can be exploited remotely over the network with low attack complexity. The impact is limited to confidentiality, as the attacker can gain access to sensitive data but cannot alter or disrupt system integrity or availability. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the vulnerability's ease of exploitation (network vector, no privileges required) but limited impact scope. No known exploits have been reported in the wild, and SAP has not yet published patches or mitigation guidance. The vulnerability highlights a weakness in how credentials or sensitive information are protected within the anonymous API, potentially exposing business-critical data to unauthorized users. Organizations using SAP Business One 10.0 should assess their exposure and implement compensating controls until official patches are available.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive business information managed within SAP Business One environments. While the impact is limited to confidentiality and does not affect system integrity or availability, the exposure of credentials or sensitive configuration data could facilitate further attacks or data breaches. Industries such as manufacturing, retail, and professional services that rely heavily on SAP Business One for ERP functions may face risks related to intellectual property theft, compliance violations (e.g., GDPR), and reputational damage. The medium severity score indicates that while the threat is not critical, it should not be ignored, especially in environments where SAP Business One is integrated with other critical business systems. The lack of known exploits reduces immediate risk but also means organizations must proactively monitor and prepare for potential exploitation attempts. Failure to address this vulnerability could lead to unauthorized data access, undermining trust and potentially triggering regulatory scrutiny in Europe.
Mitigation Recommendations
1. Restrict network access to the SAP Business One SLD anonymous API by implementing strict firewall rules and network segmentation to limit exposure to trusted users and systems only. 2. Enforce strong authentication and authorization controls around SAP Business One components, ensuring that anonymous or low-privilege access is minimized or disabled where possible. 3. Monitor logs and network traffic for unusual or unauthorized access attempts to the SLD API, employing anomaly detection tools to identify potential exploitation. 4. Engage with SAP support channels to obtain official patches or security advisories as soon as they are released and apply them promptly. 5. Conduct regular security assessments and penetration tests focusing on SAP Business One environments to identify and remediate similar weaknesses. 6. Educate system administrators and security teams about this vulnerability and the importance of protecting API endpoints, especially those that are anonymous or publicly accessible. 7. Consider deploying Web Application Firewalls (WAFs) or API gateways with strict access policies to add an additional layer of defense around SAP APIs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:22.789Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912870814bc3e00ba6f3c00
Added to database: 11/11/2025, 12:44:56 AM
Last enriched: 11/11/2025, 1:01:18 AM
Last updated: 11/11/2025, 5:08:31 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12880: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jobayer534 Progress Bar Blocks for Gutenberg
MediumCVE-2025-12813: CWE-94 Improper Control of Generation of Code ('Code Injection') in strix-bubol5 Holiday class post calendar
CriticalCVE-2025-12754: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rampantlogic Geopost
MediumCVE-2025-12753: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in sagortouch Chart Expert
MediumCVE-2025-12711: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pritenhshah Share to Google Classroom
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.