Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42902: CWE-476: NULL Pointer Dereference in SAP_SE SAP Netweaver AS ABAP and ABAP Platform

0
Medium
VulnerabilityCVE-2025-42902cvecve-2025-42902cwe-476
Published: Tue Oct 14 2025 (10/14/2025, 00:17:32 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Netweaver AS ABAP and ABAP Platform

Description

Due to the memory corruption vulnerability in SAP NetWeaver AS ABAP and ABAP Platform, an unauthenticated attacker can send a corrupted SAP Logon Ticket or SAP Assertion Ticket to the SAP application server. This leads to a dereference of NULL which makes the work process crash. As a result, it has a low impact on the availability but no impact on the confidentiality and integrity.

AI-Powered Analysis

AILast updated: 10/14/2025, 01:06:15 UTC

Technical Analysis

CVE-2025-42902 is a memory corruption vulnerability classified as CWE-476 (NULL Pointer Dereference) found in SAP NetWeaver AS ABAP and ABAP Platform. The flaw arises when the SAP application server processes a corrupted SAP Logon Ticket or SAP Assertion Ticket. An attacker, without any authentication or user interaction, can send such malformed tickets to the server, triggering a NULL pointer dereference that causes the affected work process to crash. This results in a denial-of-service condition impacting the availability of SAP services. The vulnerability affects multiple versions of the SAP kernel and platform, including versions 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, and 9.14 through 9.16. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the ease of remote exploitation without privileges but limited impact confined to availability. There is no impact on confidentiality or integrity, and no known exploits have been reported in the wild to date. The vulnerability could disrupt business operations relying on SAP systems by causing work process crashes, potentially leading to service interruptions or degraded performance. SAP has not yet published patches at the time of this report, so organizations should monitor for updates and apply them promptly once available.

Potential Impact

For European organizations, the primary impact of CVE-2025-42902 is on the availability of SAP NetWeaver AS ABAP and ABAP Platform services. Since SAP systems are critical for enterprise resource planning, finance, supply chain, and other core business functions, work process crashes could lead to temporary service outages or degraded system performance. This may disrupt business operations, cause delays in transaction processing, and increase operational costs due to downtime. However, the vulnerability does not compromise data confidentiality or integrity, so risks of data leakage or unauthorized data modification are not present. Organizations with high SAP dependency, especially in sectors like manufacturing, finance, and public administration, may experience operational impacts. The lack of authentication requirement and ease of exploitation increase the risk of opportunistic denial-of-service attacks, although the absence of known exploits reduces immediate threat levels. Overall, the impact is moderate but significant enough to warrant proactive mitigation to ensure business continuity.

Mitigation Recommendations

1. Monitor SAP Security Notes and vendor advisories closely for the release of official patches addressing CVE-2025-42902 and apply them promptly across all affected SAP NetWeaver AS ABAP and ABAP Platform versions. 2. Implement network-level access controls and filtering to restrict incoming SAP Logon Ticket and SAP Assertion Ticket traffic to trusted sources only, reducing exposure to unauthenticated attackers. 3. Enable and review detailed SAP system logs and alerts to detect abnormal work process crashes or unusual ticket processing activity indicative of exploitation attempts. 4. Consider deploying SAP EarlyWatch or similar monitoring tools to gain real-time visibility into system health and performance anomalies. 5. Conduct internal audits to identify all SAP systems running affected versions and prioritize patching and mitigation efforts accordingly. 6. Harden SAP system configurations by disabling unnecessary services or interfaces that process external tickets where feasible. 7. Educate SAP administrators and security teams about this vulnerability and establish incident response procedures to quickly address potential denial-of-service incidents. 8. If patching is delayed, consider temporary mitigations such as rate limiting or isolating vulnerable SAP instances from untrusted networks to minimize attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:25.736Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed9e3ae121319cf76b7b3a

Added to database: 10/14/2025, 12:50:02 AM

Last enriched: 10/14/2025, 1:06:15 AM

Last updated: 10/16/2025, 2:08:28 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats