Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42940: CWE-787: Out-of-bounds Write in SAP_SE SAP CommonCryptoLib

0
High
VulnerabilityCVE-2025-42940cvecve-2025-42940cwe-787
Published: Tue Nov 11 2025 (11/11/2025, 00:20:44 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP CommonCryptoLib

Description

SAP CommonCryptoLib does not perform necessary boundary checks during pre-authentication parsing of manipulated ASN.1 data over the network. This may result in memory corruption followed by an application crash, hence leading to a high impact on availability. There is no impact on confidentiality or integrity.

AI-Powered Analysis

AILast updated: 11/18/2025, 05:43:25 UTC

Technical Analysis

CVE-2025-42940 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting SAP CommonCryptoLib, specifically version CRYPTOLIB 8. The vulnerability arises because the library fails to perform adequate boundary checks when parsing ASN.1 data received over the network prior to authentication. ASN.1 (Abstract Syntax Notation One) is a standard interface for representing data structures, commonly used in cryptographic protocols. An attacker can craft manipulated ASN.1 data packets that trigger out-of-bounds memory writes during parsing. This memory corruption can cause the application using the library to crash, resulting in denial-of-service conditions. The vulnerability does not affect confidentiality or integrity, as it does not allow data leakage or unauthorized modification. Exploitation requires no authentication or user interaction and can be performed remotely, making it a significant risk. Although no known exploits have been reported in the wild, the vulnerability’s characteristics and CVSS score of 7.5 indicate a high potential impact. SAP CommonCryptoLib is widely used in SAP enterprise environments for cryptographic operations, making this vulnerability relevant for organizations relying on SAP software stacks. The lack of boundary checks during pre-authentication parsing means that attackers can target exposed network interfaces to disrupt availability without needing credentials. This could impact critical business applications and services dependent on SAP systems, leading to operational downtime and potential financial losses.

Potential Impact

For European organizations, the primary impact of CVE-2025-42940 is on availability, as successful exploitation results in application crashes and denial-of-service conditions. This can disrupt business-critical SAP services, affecting enterprise resource planning (ERP), supply chain management, and financial operations. Given SAP’s extensive use across Europe, especially in manufacturing, automotive, finance, and public sectors, downtime could lead to significant operational and economic consequences. There is no direct risk to data confidentiality or integrity, but service interruptions could indirectly affect business continuity and compliance with regulatory requirements such as GDPR if service outages impede timely data processing or reporting. The vulnerability’s remote exploitability without authentication increases the risk of widespread attacks, particularly if attackers scan for exposed SAP CommonCryptoLib interfaces. Organizations with internet-facing SAP components or insufficient network segmentation are at higher risk. The absence of known exploits in the wild currently reduces immediate threat levels, but the vulnerability’s characteristics warrant proactive mitigation to prevent future exploitation attempts.

Mitigation Recommendations

1. Apply SAP vendor patches or updates for CommonCryptoLib CRYPTOLIB 8 as soon as they become available to address the boundary check flaw. 2. Implement network-level controls such as firewalls and intrusion prevention systems to restrict access to SAP CommonCryptoLib interfaces, limiting exposure to trusted internal networks or VPNs. 3. Conduct regular vulnerability scanning and penetration testing focused on SAP environments to detect unpatched instances and potential attack vectors. 4. Monitor network traffic for anomalous ASN.1 data patterns that could indicate exploitation attempts. 5. Employ SAP security best practices, including minimizing the attack surface by disabling unnecessary services and interfaces. 6. Establish incident response plans specific to SAP service disruptions to ensure rapid recovery in case of denial-of-service events. 7. Collaborate with SAP support and security advisories to stay informed about updates and emerging threats related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:34.582Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912870814bc3e00ba6f3c10

Added to database: 11/11/2025, 12:44:56 AM

Last enriched: 11/18/2025, 5:43:25 AM

Last updated: 12/25/2025, 1:13:25 PM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats