CVE-2025-42897: CWE-522: Insufficiently Protected Credentials in SAP_SE SAP Business One (SLD)
Due to information disclosure vulnerability in anonymous API provided by SAP Business One (SLD), an attacker with normal user access could gain access to unauthorized information. As a result, it has a low impact on the confidentiality of the application but no impact on the integrity and availability.
AI Analysis
Technical Summary
CVE-2025-42897 is a medium-severity vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting SAP Business One (SLD) versions B1_ON_HANA 10.0 and SAP-M-BO 10.0. The flaw arises from an information disclosure issue in an anonymous API endpoint, which allows an attacker possessing normal user access to retrieve unauthorized information. This vulnerability does not require elevated privileges or user interaction, making it relatively easy to exploit remotely over the network. The impact is limited to confidentiality, with no effect on data integrity or system availability. The vulnerability was reserved in April 2025 and published in November 2025, with no patches currently available. SAP Business One is widely used for enterprise resource planning in small to medium-sized businesses, and the SLD (System Landscape Directory) component manages system and service information. Exposure of sensitive credentials or configuration data through this API could facilitate further attacks or data breaches. Although no exploits are known in the wild, the vulnerability demands attention due to the sensitive nature of the information potentially disclosed and the broad deployment of SAP Business One in various industries.
Potential Impact
For European organizations, the confidentiality breach could lead to unauthorized disclosure of sensitive business information, including credentials or configuration details that may be leveraged for lateral movement or further exploitation. While the vulnerability does not directly affect integrity or availability, the leaked information could indirectly facilitate more severe attacks. Industries such as manufacturing, retail, and professional services that rely heavily on SAP Business One for operational management are particularly at risk. The exposure could undermine trust, lead to regulatory compliance issues under GDPR due to potential data leaks, and cause financial and reputational damage. Since the vulnerability requires only normal user access, insider threats or compromised user accounts could be exploited to gain unauthorized information. The lack of patches increases the urgency for organizations to implement compensating controls to protect sensitive data within SAP environments.
Mitigation Recommendations
Until official patches are released by SAP, European organizations should implement strict access controls limiting normal user permissions to the minimum necessary. Monitor and audit API usage logs for unusual or unauthorized access patterns to the SLD anonymous API. Employ network segmentation to isolate SAP Business One components and restrict access to trusted hosts and users only. Use encryption for sensitive data in transit and at rest to reduce the impact of any information disclosure. Conduct regular credential audits and rotate credentials associated with SAP Business One services. Engage with SAP support and subscribe to security advisories for timely patch deployment once available. Additionally, consider deploying Web Application Firewalls (WAFs) or API gateways to detect and block suspicious API requests targeting the vulnerable endpoints. Train staff to recognize and report suspicious activities related to SAP system access.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-42897: CWE-522: Insufficiently Protected Credentials in SAP_SE SAP Business One (SLD)
Description
Due to information disclosure vulnerability in anonymous API provided by SAP Business One (SLD), an attacker with normal user access could gain access to unauthorized information. As a result, it has a low impact on the confidentiality of the application but no impact on the integrity and availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-42897 is a medium-severity vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting SAP Business One (SLD) versions B1_ON_HANA 10.0 and SAP-M-BO 10.0. The flaw arises from an information disclosure issue in an anonymous API endpoint, which allows an attacker possessing normal user access to retrieve unauthorized information. This vulnerability does not require elevated privileges or user interaction, making it relatively easy to exploit remotely over the network. The impact is limited to confidentiality, with no effect on data integrity or system availability. The vulnerability was reserved in April 2025 and published in November 2025, with no patches currently available. SAP Business One is widely used for enterprise resource planning in small to medium-sized businesses, and the SLD (System Landscape Directory) component manages system and service information. Exposure of sensitive credentials or configuration data through this API could facilitate further attacks or data breaches. Although no exploits are known in the wild, the vulnerability demands attention due to the sensitive nature of the information potentially disclosed and the broad deployment of SAP Business One in various industries.
Potential Impact
For European organizations, the confidentiality breach could lead to unauthorized disclosure of sensitive business information, including credentials or configuration details that may be leveraged for lateral movement or further exploitation. While the vulnerability does not directly affect integrity or availability, the leaked information could indirectly facilitate more severe attacks. Industries such as manufacturing, retail, and professional services that rely heavily on SAP Business One for operational management are particularly at risk. The exposure could undermine trust, lead to regulatory compliance issues under GDPR due to potential data leaks, and cause financial and reputational damage. Since the vulnerability requires only normal user access, insider threats or compromised user accounts could be exploited to gain unauthorized information. The lack of patches increases the urgency for organizations to implement compensating controls to protect sensitive data within SAP environments.
Mitigation Recommendations
Until official patches are released by SAP, European organizations should implement strict access controls limiting normal user permissions to the minimum necessary. Monitor and audit API usage logs for unusual or unauthorized access patterns to the SLD anonymous API. Employ network segmentation to isolate SAP Business One components and restrict access to trusted hosts and users only. Use encryption for sensitive data in transit and at rest to reduce the impact of any information disclosure. Conduct regular credential audits and rotate credentials associated with SAP Business One services. Engage with SAP support and subscribe to security advisories for timely patch deployment once available. Additionally, consider deploying Web Application Firewalls (WAFs) or API gateways to detect and block suspicious API requests targeting the vulnerable endpoints. Train staff to recognize and report suspicious activities related to SAP system access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:22.789Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912870814bc3e00ba6f3c00
Added to database: 11/11/2025, 12:44:56 AM
Last enriched: 11/18/2025, 5:42:47 AM
Last updated: 12/21/2025, 8:44:25 PM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14995: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14994: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14855: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brainstormforce SureForms – Contact Form, Payment Form & Other Custom Form Builder
HighCVE-2025-14800: CWE-434 Unrestricted Upload of File with Dangerous Type in themeisle Redirection for Contact Form 7
HighCVE-2025-14993: Stack-based Buffer Overflow in Tenda AC18
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.