Skip to main content

CVE-2025-42944: CWE-502: Deserialization of Untrusted Data in SAP_SE SAP Netweaver (RMI-P4)

Critical
VulnerabilityCVE-2025-42944cvecve-2025-42944cwe-502
Published: Tue Sep 09 2025 (09/09/2025, 02:11:39 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Netweaver (RMI-P4)

Description

Due to a deserialization vulnerability in SAP NetWeaver, an unauthenticated attacker could exploit the system through the RMI-P4 module by submitting malicious payload to an open port. The deserialization of such untrusted Java objects could lead to arbitrary OS command execution, posing a high impact to the application's confidentiality, integrity, and availability.

AI-Powered Analysis

AILast updated: 09/09/2025, 02:31:31 UTC

Technical Analysis

CVE-2025-42944 is a critical deserialization vulnerability identified in SAP NetWeaver's RMI-P4 module, specifically affecting the SERVERCORE 7.50 version. The vulnerability arises from the unsafe deserialization of untrusted Java objects submitted via an open network port. Because the RMI-P4 module accepts serialized Java objects without sufficient validation or sanitization, an unauthenticated attacker can craft malicious payloads that, when deserialized, execute arbitrary operating system commands on the underlying server. This leads to a complete compromise of the affected system's confidentiality, integrity, and availability. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), which is a common vector for remote code execution attacks. The CVSS v3.1 base score is 10.0, indicating maximum severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact includes full control over the SAP NetWeaver server, enabling attackers to steal sensitive data, modify or delete information, disrupt business processes, or pivot to other internal systems. Although no known exploits have been reported in the wild yet, the critical nature and ease of exploitation make this a high-priority threat for organizations using the affected SAP NetWeaver version.

Potential Impact

For European organizations, the impact of CVE-2025-42944 is significant due to the widespread use of SAP NetWeaver in enterprise resource planning (ERP), supply chain management, and other critical business functions. Successful exploitation could lead to unauthorized access to sensitive corporate data, including financial records, personal data protected under GDPR, and intellectual property. The ability to execute arbitrary OS commands could allow attackers to disrupt operations by shutting down systems or deploying ransomware. Given the critical role SAP systems play in many European industries such as manufacturing, finance, and public sector services, this vulnerability poses a direct threat to operational continuity and regulatory compliance. Additionally, the breach of confidentiality and integrity could result in severe reputational damage and legal consequences under European data protection laws. The lack of authentication requirement and no user interaction needed further increase the risk, as attackers can remotely exploit vulnerable systems without insider access or social engineering.

Mitigation Recommendations

Immediate mitigation steps should include: 1) Applying any available patches or updates from SAP as soon as they are released, even though no patch links are currently provided, organizations should monitor SAP security advisories closely. 2) Restrict network exposure of the RMI-P4 service by implementing strict firewall rules to limit access only to trusted internal IP addresses or VPNs. 3) Employ network segmentation to isolate SAP NetWeaver servers from general user networks and the internet. 4) Use intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious deserialization payloads or anomalous traffic targeting the RMI-P4 port. 5) Conduct thorough audits of SAP NetWeaver configurations to disable or harden unused services and interfaces. 6) Implement runtime application self-protection (RASP) or Java security managers to detect and prevent unsafe deserialization at runtime. 7) Prepare incident response plans specifically addressing potential exploitation scenarios of this vulnerability. 8) Educate IT and security teams about the risks of deserialization vulnerabilities and the importance of timely patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:37.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bf8dfad5a2966cfc85817c

Added to database: 9/9/2025, 2:16:26 AM

Last enriched: 9/9/2025, 2:31:31 AM

Last updated: 9/9/2025, 9:44:33 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats