Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42904: CWE-549: Missing Password Field Masking in SAP_SE Application Server ABAP

0
Medium
VulnerabilityCVE-2025-42904cvecve-2025-42904cwe-549
Published: Tue Dec 09 2025 (12/09/2025, 02:15:36 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: Application Server ABAP

Description

Due to an Information Disclosure vulnerability in Application Server ABAP, an authenticated attacker could read unmasked values displayed in ABAP Lists. Successful exploitation could lead to unauthorized disclosure of data, resulting in a high impact on confidentiality without affecting integrity or availability.

AI-Powered Analysis

AILast updated: 12/16/2025, 06:06:19 UTC

Technical Analysis

CVE-2025-42904 is a medium-severity information disclosure vulnerability identified in SAP SE's Application Server ABAP, specifically related to missing password field masking in ABAP Lists. The vulnerability arises because certain password or sensitive input fields are not properly masked when displayed, allowing authenticated users to see sensitive information in clear text. This flaw is classified under CWE-549, which pertains to missing password masking, a common security oversight that can lead to unintended data exposure. The affected SAP Application Server ABAP versions include KRNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, 7.93, 9.16, and 9.17. The vulnerability requires an attacker to have valid authentication credentials (PR:L) but does not require user interaction (UI:N) and can be exploited remotely (AV:N). The scope is unchanged (S:U), meaning the vulnerability affects only the component where it exists without impacting other components. The CVSS v3.1 base score is 6.5, reflecting a high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). Successful exploitation could lead to unauthorized disclosure of sensitive data, such as passwords or other confidential information displayed in ABAP lists, potentially enabling further attacks or data breaches. No known exploits have been reported in the wild, and no official patches were linked at the time of disclosure, indicating that organizations must proactively implement mitigations. The vulnerability highlights a critical security best practice failure in masking sensitive fields within enterprise applications, which is essential to prevent accidental or malicious data leaks.

Potential Impact

For European organizations, the impact of CVE-2025-42904 is primarily on confidentiality, as sensitive information such as passwords or other confidential data may be exposed to authenticated users who should not have access to such details. This can lead to unauthorized data disclosure, increasing the risk of insider threats, privilege escalation, or lateral movement within the network. While the vulnerability does not affect system integrity or availability, the exposure of sensitive credentials or data can facilitate subsequent attacks that compromise these aspects. Organizations relying heavily on SAP Application Server ABAP for critical business processes, including finance, manufacturing, and supply chain management, could face significant operational and reputational risks if sensitive data is leaked. The requirement for authentication limits the attack surface to insiders or compromised accounts, but given the widespread use of SAP in European enterprises, the potential for exploitation remains notable. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting personal and sensitive data, so unauthorized disclosure could lead to compliance violations and financial penalties.

Mitigation Recommendations

To mitigate CVE-2025-42904, European organizations should: 1) Immediately review and restrict access controls to SAP Application Server ABAP environments, ensuring that only authorized personnel have access to sensitive ABAP lists. 2) Conduct audits of user privileges and remove or limit accounts with unnecessary access to sensitive data displays. 3) Implement monitoring and alerting for unusual access patterns or attempts to view sensitive ABAP lists. 4) Apply SAP security notes and patches as soon as they become available, maintaining close communication with SAP support channels for updates. 5) Where possible, configure SAP systems to enforce masking of password fields or sensitive data in ABAP lists, potentially through custom development or configuration changes. 6) Educate users and administrators about the risks of exposing sensitive information and enforce strong authentication and session management practices to reduce the risk of credential compromise. 7) Consider network segmentation to isolate SAP systems and limit exposure to potential attackers. 8) Perform regular security assessments and penetration testing focused on SAP environments to detect similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:25.736Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69378a8b0af42da4c56f97c2

Added to database: 12/9/2025, 2:33:47 AM

Last enriched: 12/16/2025, 6:06:19 AM

Last updated: 2/4/2026, 11:43:43 PM

Views: 171

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats