Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42933: CWE-522: Insufficiently Protected Credentials in SAP_SE SAP Business One (SLD)

0
High
VulnerabilityCVE-2025-42933cvecve-2025-42933cwe-522
Published: Tue Sep 09 2025 (09/09/2025, 02:11:26 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Business One (SLD)

Description

When a user logs in via SAP Business One native client, the SLD backend service fails to enforce proper encryption of certain APIs. This leads to exposure of sensitive credentials within http response body. As a result, it has a high impact on the confidentiality, integrity, and availability of the application.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:13:31 UTC

Technical Analysis

CVE-2025-42933 is a high-severity vulnerability affecting SAP Business One (SLD) versions B1_ON_HANA 10.0 and SAP-M-BO 10.0. The issue stems from insufficient protection of credentials during user login via the SAP Business One native client. Specifically, the System Landscape Directory (SLD) backend service fails to enforce proper encryption on certain APIs, resulting in sensitive credentials being exposed within the HTTP response body. This exposure violates secure communication principles and directly compromises the confidentiality of user credentials. The vulnerability is classified under CWE-522, which relates to insufficiently protected credentials. The CVSS v3.1 score of 8.8 reflects a high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring low privileges but no user interaction. Exploiting this vulnerability could allow attackers to intercept or retrieve sensitive authentication data, potentially leading to unauthorized access, data manipulation, or service disruption within the SAP Business One environment. Although no known exploits are currently reported in the wild, the nature of the vulnerability and its high CVSS score indicate a significant risk if left unmitigated. The lack of encryption enforcement on APIs suggests that attackers with network access could perform man-in-the-middle attacks or eavesdrop on communications to harvest credentials. Given SAP Business One's role in managing business processes and sensitive enterprise data, this vulnerability poses a critical threat to organizational security.

Potential Impact

For European organizations, the impact of CVE-2025-42933 is substantial. SAP Business One is widely used by small and medium-sized enterprises (SMEs) across Europe for enterprise resource planning (ERP), financial management, and supply chain operations. Exposure of credentials can lead to unauthorized access to critical business data, financial records, and operational controls. This can result in data breaches, financial fraud, disruption of business processes, and potential regulatory non-compliance, especially under GDPR requirements for protecting personal and sensitive data. The compromise of integrity and availability could disrupt business continuity, leading to operational downtime and reputational damage. Furthermore, given the interconnected nature of supply chains in Europe, a breach in one organization could cascade, affecting partners and customers. The vulnerability's exploitation could also facilitate lateral movement within corporate networks, increasing the scope of impact. The high severity and network-based attack vector mean that attackers do not require physical access or user interaction, increasing the risk of widespread exploitation in networked environments.

Mitigation Recommendations

To mitigate CVE-2025-42933, European organizations should implement the following specific measures: 1) Immediately apply any available patches or updates from SAP once released; monitor SAP security advisories closely. 2) Enforce the use of secure communication protocols such as TLS 1.2 or higher for all SAP Business One client-server interactions, ensuring that APIs do not transmit sensitive data in plaintext. 3) Conduct network segmentation to isolate SAP Business One servers and restrict access to trusted hosts and users only, minimizing exposure to potential attackers. 4) Deploy network monitoring and intrusion detection systems to identify anomalous traffic patterns indicative of credential interception attempts. 5) Implement strict access controls and multi-factor authentication (MFA) for SAP Business One users to reduce the risk of compromised credentials leading to unauthorized access. 6) Regularly audit and review SAP Business One configurations and logs to detect suspicious activities early. 7) Educate IT and security teams about this vulnerability to ensure rapid response and remediation. 8) Consider deploying web application firewalls (WAFs) or API gateways that can enforce encryption and block insecure API calls. These targeted actions go beyond generic advice by focusing on encryption enforcement, network controls, and proactive monitoring tailored to the vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:34.581Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bf8dfad5a2966cfc858174

Added to database: 9/9/2025, 2:16:26 AM

Last enriched: 9/17/2025, 1:13:31 AM

Last updated: 10/30/2025, 2:14:21 PM

Views: 115

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats