Skip to main content

CVE-2025-42946: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in SAP_SE SAP S/4HANA (Bank Communication Management)

Medium
VulnerabilityCVE-2025-42946cvecve-2025-42946cwe-22
Published: Tue Aug 12 2025 (08/12/2025, 02:07:16 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP S/4HANA (Bank Communication Management)

Description

Due to directory traversal vulnerability in SAP S/4HANA (Bank Communication Management), an attacker with high privileges and access to a specific transaction and method in Bank Communication Management could gain unauthorized access to sensitive operating system files. This could allow the attacker to potentially read or delete these files hence causing a high impact on confidentiality and low impact on integrity. There is no impact on availability of the system.

AI-Powered Analysis

AILast updated: 08/20/2025, 02:00:01 UTC

Technical Analysis

CVE-2025-42946 is a directory traversal vulnerability identified in SAP S/4HANA's Bank Communication Management module. This vulnerability arises due to improper limitation of a pathname to a restricted directory (CWE-22), allowing an attacker with high privileges and access to a specific transaction and method within the Bank Communication Management component to manipulate file paths. Exploiting this flaw, the attacker can traverse directories beyond the intended scope and gain unauthorized access to sensitive operating system files. The vulnerability primarily impacts confidentiality, as the attacker could read sensitive files, and to a lesser extent integrity, since deletion of files is also possible. However, availability remains unaffected. The affected SAP versions include multiple releases across SAP_APPL, SAP_FIN, and S4CORE components, indicating a broad impact across SAP S/4HANA deployments. The CVSS v3.1 base score is 6.9 (medium severity), with the vector indicating the attack requires adjacent network access (AV:A), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and impacts confidentiality highly (C:H), integrity lightly (I:L), and no impact on availability (A:N). No known exploits are currently in the wild, and no patches are linked yet, suggesting the vulnerability is newly disclosed. The vulnerability's exploitation requires an attacker to have high privileges and access to specific transactions, limiting the attack surface but still posing a significant risk within compromised or insider threat scenarios. Given SAP S/4HANA's critical role in enterprise resource planning and financial operations, unauthorized access to OS files could lead to exposure of sensitive data and potential manipulation of system files, undermining organizational security and compliance.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread adoption of SAP S/4HANA in financial and operational environments. The Bank Communication Management module is integral to handling sensitive financial transactions and communications with banking institutions. Unauthorized access to operating system files could lead to exposure of confidential financial data, customer information, or internal credentials, potentially resulting in regulatory non-compliance with GDPR and other data protection laws. The ability to delete files, although limited in impact, could disrupt internal processes or forensic investigations. Since the vulnerability requires high privileges, the primary risk vector is insider threats or attackers who have already compromised privileged accounts. The medium severity score reflects the balance between the required privileges and the high confidentiality impact. European organizations with SAP S/4HANA deployments should consider this vulnerability critical in the context of financial data protection and operational security, especially in sectors like banking, insurance, and large enterprises where SAP is heavily used.

Mitigation Recommendations

1. Immediate review and restriction of user privileges within SAP S/4HANA, ensuring that only necessary personnel have access to the Bank Communication Management transactions and methods. 2. Implement strict monitoring and auditing of privileged user activities related to Bank Communication Management to detect any anomalous access patterns. 3. Apply SAP security notes and patches as soon as they become available for this CVE to remediate the vulnerability. 4. Employ network segmentation to limit adjacent network access to SAP systems, reducing the attack surface. 5. Conduct regular security assessments and penetration testing focusing on SAP modules to identify potential privilege escalations or misuse. 6. Enhance logging and alerting on file access operations at the operating system level for SAP servers to detect unauthorized file reads or deletions. 7. Educate SAP administrators and users about the risks of privilege misuse and enforce strong authentication mechanisms to protect high-privilege accounts. 8. Consider deploying application-level controls or web application firewalls that can detect and block directory traversal attempts if feasible within the SAP environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:37.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689aa7d2ad5a09ad002be772

Added to database: 8/12/2025, 2:32:50 AM

Last enriched: 8/20/2025, 2:00:01 AM

Last updated: 9/2/2025, 5:14:27 AM

Views: 36

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats