CVE-2025-42911: CWE-862: Missing Authorization in SAP_SE SAP NetWeaver (Service Data Download)
SAP NetWeaver (Service Data Download) allows an authenticated user to call a remote-enabled function module, which could grant access to information about the SAP system and operating system. This leads to a low impact on confidentiality, with no effect on the integrity and availability of the application
AI Analysis
Technical Summary
CVE-2025-42911 is a medium-severity vulnerability affecting SAP NetWeaver's Service Data Download functionality across multiple SAP_BASIS versions ranging from 700 to 816. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, an authenticated user with at least low-level privileges can invoke a remote-enabled function module without proper authorization checks. This flaw allows the user to access information about the underlying SAP system and the operating system it runs on. While the vulnerability does not permit modification of data or disruption of service, it leaks system information that could be leveraged for further attacks. The CVSS 3.1 base score is 5.0, reflecting a network attack vector with low attack complexity, requiring privileges but no user interaction, and impacting confidentiality only. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability's impact is limited to information disclosure, with no direct effect on integrity or availability.
Potential Impact
For European organizations, especially those heavily reliant on SAP NetWeaver for enterprise resource planning and business operations, this vulnerability poses a moderate risk. The unauthorized disclosure of system and OS information can aid attackers in crafting targeted attacks, such as privilege escalation or lateral movement within the network. Although the immediate confidentiality impact is low, the information leakage could be a stepping stone for more severe breaches. Organizations in regulated industries (finance, healthcare, manufacturing) may face compliance risks if sensitive system details are exposed. Given SAP's widespread use in Europe, the vulnerability could affect critical infrastructure and large enterprises, potentially leading to reputational damage and operational disruptions if exploited in chained attacks.
Mitigation Recommendations
Organizations should implement strict access controls and ensure that only trusted and necessary users have authenticated access to SAP NetWeaver systems. Monitoring and logging of remote function calls should be enhanced to detect unusual access patterns. Applying SAP security notes and patches as soon as they become available is critical. In the interim, restricting network access to SAP NetWeaver Service Data Download interfaces via network segmentation and firewall rules can reduce exposure. Conducting regular security audits and penetration testing focused on SAP environments will help identify and remediate authorization weaknesses. Additionally, applying the principle of least privilege to SAP user roles and disabling unused remote-enabled function modules can limit the attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Switzerland
CVE-2025-42911: CWE-862: Missing Authorization in SAP_SE SAP NetWeaver (Service Data Download)
Description
SAP NetWeaver (Service Data Download) allows an authenticated user to call a remote-enabled function module, which could grant access to information about the SAP system and operating system. This leads to a low impact on confidentiality, with no effect on the integrity and availability of the application
AI-Powered Analysis
Technical Analysis
CVE-2025-42911 is a medium-severity vulnerability affecting SAP NetWeaver's Service Data Download functionality across multiple SAP_BASIS versions ranging from 700 to 816. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, an authenticated user with at least low-level privileges can invoke a remote-enabled function module without proper authorization checks. This flaw allows the user to access information about the underlying SAP system and the operating system it runs on. While the vulnerability does not permit modification of data or disruption of service, it leaks system information that could be leveraged for further attacks. The CVSS 3.1 base score is 5.0, reflecting a network attack vector with low attack complexity, requiring privileges but no user interaction, and impacting confidentiality only. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability's impact is limited to information disclosure, with no direct effect on integrity or availability.
Potential Impact
For European organizations, especially those heavily reliant on SAP NetWeaver for enterprise resource planning and business operations, this vulnerability poses a moderate risk. The unauthorized disclosure of system and OS information can aid attackers in crafting targeted attacks, such as privilege escalation or lateral movement within the network. Although the immediate confidentiality impact is low, the information leakage could be a stepping stone for more severe breaches. Organizations in regulated industries (finance, healthcare, manufacturing) may face compliance risks if sensitive system details are exposed. Given SAP's widespread use in Europe, the vulnerability could affect critical infrastructure and large enterprises, potentially leading to reputational damage and operational disruptions if exploited in chained attacks.
Mitigation Recommendations
Organizations should implement strict access controls and ensure that only trusted and necessary users have authenticated access to SAP NetWeaver systems. Monitoring and logging of remote function calls should be enhanced to detect unusual access patterns. Applying SAP security notes and patches as soon as they become available is critical. In the interim, restricting network access to SAP NetWeaver Service Data Download interfaces via network segmentation and firewall rules can reduce exposure. Conducting regular security audits and penetration testing focused on SAP environments will help identify and remediate authorization weaknesses. Additionally, applying the principle of least privilege to SAP user roles and disabling unused remote-enabled function modules can limit the attack surface.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:30.252Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bf8df9d5a2966cfc85812a
Added to database: 9/9/2025, 2:16:25 AM
Last enriched: 9/9/2025, 2:34:22 AM
Last updated: 9/9/2025, 9:12:27 PM
Views: 3
Related Threats
CVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21336: CWE-203: Observable Discrepancy in Microsoft Windows 10 Version 1809
MediumCVE-2025-21332: CWE-41: Improper Resolution of Path Equivalence in Microsoft Windows Server 2025
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.