CVE-2025-42944: CWE-502: Deserialization of Untrusted Data in SAP_SE SAP Netweaver (RMI-P4)
Due to a deserialization vulnerability in SAP NetWeaver, an unauthenticated attacker could exploit the system through the RMI-P4 module by submitting malicious payload to an open port. The deserialization of such untrusted Java objects could lead to arbitrary OS command execution, posing a high impact to the application's confidentiality, integrity, and availability.
AI Analysis
Technical Summary
CVE-2025-42944 is a critical security vulnerability identified in SAP NetWeaver SERVERCORE 7.50, specifically within the RMI-P4 module. The vulnerability arises from improper handling of Java object deserialization, classified under CWE-502 (Deserialization of Untrusted Data). An attacker can exploit this flaw by sending crafted malicious serialized Java objects to an exposed RMI-P4 service port without requiring authentication or user interaction. Successful exploitation allows arbitrary operating system command execution on the affected server, compromising the confidentiality, integrity, and availability of the system and potentially the broader enterprise environment. The vulnerability has a CVSS v3.1 base score of 10.0, indicating maximum severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C). This means the attacker can remotely and easily exploit the vulnerability to gain full control over the system. SAP NetWeaver is widely used in enterprise environments for critical business processes, making this vulnerability particularly dangerous. Although no public exploits have been reported yet, the criticality and ease of exploitation make it a prime target for threat actors. The lack of available patches at the time of disclosure necessitates immediate defensive measures to mitigate risk.
Potential Impact
The impact of CVE-2025-42944 on European organizations is substantial due to SAP NetWeaver's widespread deployment in critical sectors such as manufacturing, finance, logistics, and public administration. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, steal sensitive data, disrupt business operations, or deploy ransomware. Confidentiality breaches could expose personal data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity violations may corrupt business-critical data, affecting decision-making and operational reliability. Availability impacts could result in downtime of essential services, causing financial losses and operational delays. Given the vulnerability requires no authentication and no user interaction, the attack surface is broad, increasing the likelihood of successful exploitation. European organizations with exposed RMI-P4 ports or insufficient network segmentation are particularly vulnerable. The threat also extends to supply chain partners and customers connected to affected SAP systems, amplifying the risk.
Mitigation Recommendations
1. Immediate network-level mitigation: Restrict access to the RMI-P4 service port using firewalls and network segmentation to limit exposure only to trusted internal systems. 2. Monitor network traffic for unusual or unexpected serialized Java object payloads targeting the RMI-P4 port. 3. Implement strict ingress filtering and intrusion detection/prevention systems (IDS/IPS) tuned to detect deserialization attack patterns. 4. Apply SAP security notes and patches as soon as they become available from SAP to remediate the vulnerability. 5. Conduct thorough audits of SAP NetWeaver configurations to ensure no unnecessary services are exposed externally. 6. Employ application-layer security controls such as Web Application Firewalls (WAFs) with custom rules to block malicious payloads. 7. Establish incident response plans specifically addressing potential exploitation of deserialization vulnerabilities. 8. Educate IT and security teams about the risks of deserialization attacks and signs of compromise. 9. Regularly update and patch all related infrastructure components to reduce the attack surface. 10. Engage with SAP support and threat intelligence providers for timely updates and indicators of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-42944: CWE-502: Deserialization of Untrusted Data in SAP_SE SAP Netweaver (RMI-P4)
Description
Due to a deserialization vulnerability in SAP NetWeaver, an unauthenticated attacker could exploit the system through the RMI-P4 module by submitting malicious payload to an open port. The deserialization of such untrusted Java objects could lead to arbitrary OS command execution, posing a high impact to the application's confidentiality, integrity, and availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-42944 is a critical security vulnerability identified in SAP NetWeaver SERVERCORE 7.50, specifically within the RMI-P4 module. The vulnerability arises from improper handling of Java object deserialization, classified under CWE-502 (Deserialization of Untrusted Data). An attacker can exploit this flaw by sending crafted malicious serialized Java objects to an exposed RMI-P4 service port without requiring authentication or user interaction. Successful exploitation allows arbitrary operating system command execution on the affected server, compromising the confidentiality, integrity, and availability of the system and potentially the broader enterprise environment. The vulnerability has a CVSS v3.1 base score of 10.0, indicating maximum severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C). This means the attacker can remotely and easily exploit the vulnerability to gain full control over the system. SAP NetWeaver is widely used in enterprise environments for critical business processes, making this vulnerability particularly dangerous. Although no public exploits have been reported yet, the criticality and ease of exploitation make it a prime target for threat actors. The lack of available patches at the time of disclosure necessitates immediate defensive measures to mitigate risk.
Potential Impact
The impact of CVE-2025-42944 on European organizations is substantial due to SAP NetWeaver's widespread deployment in critical sectors such as manufacturing, finance, logistics, and public administration. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, steal sensitive data, disrupt business operations, or deploy ransomware. Confidentiality breaches could expose personal data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity violations may corrupt business-critical data, affecting decision-making and operational reliability. Availability impacts could result in downtime of essential services, causing financial losses and operational delays. Given the vulnerability requires no authentication and no user interaction, the attack surface is broad, increasing the likelihood of successful exploitation. European organizations with exposed RMI-P4 ports or insufficient network segmentation are particularly vulnerable. The threat also extends to supply chain partners and customers connected to affected SAP systems, amplifying the risk.
Mitigation Recommendations
1. Immediate network-level mitigation: Restrict access to the RMI-P4 service port using firewalls and network segmentation to limit exposure only to trusted internal systems. 2. Monitor network traffic for unusual or unexpected serialized Java object payloads targeting the RMI-P4 port. 3. Implement strict ingress filtering and intrusion detection/prevention systems (IDS/IPS) tuned to detect deserialization attack patterns. 4. Apply SAP security notes and patches as soon as they become available from SAP to remediate the vulnerability. 5. Conduct thorough audits of SAP NetWeaver configurations to ensure no unnecessary services are exposed externally. 6. Employ application-layer security controls such as Web Application Firewalls (WAFs) with custom rules to block malicious payloads. 7. Establish incident response plans specifically addressing potential exploitation of deserialization vulnerabilities. 8. Educate IT and security teams about the risks of deserialization attacks and signs of compromise. 9. Regularly update and patch all related infrastructure components to reduce the attack surface. 10. Engage with SAP support and threat intelligence providers for timely updates and indicators of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:37.187Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bf8dfad5a2966cfc85817c
Added to database: 9/9/2025, 2:16:26 AM
Last enriched: 11/12/2025, 7:08:48 PM
Last updated: 12/13/2025, 6:12:20 PM
Views: 435
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14621: SQL Injection in code-projects Student File Management System
MediumCVE-2025-14620: SQL Injection in code-projects Student File Management System
MediumCVE-2025-14619: SQL Injection in code-projects Student File Management System
MediumCVE-2025-14617: Path Traversal in Jehovahs Witnesses JW Library App
MediumCVE-2025-14607: Memory Corruption in OFFIS DCMTK
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.