Skip to main content

CVE-2025-42952: CWE-862: Missing Authorization in SAP_SE SAP Business Warehouse and SAP Plug-In Basis

High
VulnerabilityCVE-2025-42952cvecve-2025-42952cwe-862
Published: Tue Jul 08 2025 (07/08/2025, 00:34:32 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Business Warehouse and SAP Plug-In Basis

Description

SAP Business Warehouse and SAP Plug-In Basis allows an authenticated attacker to add fields to arbitrary SAP database tables and/or structures, potentially rendering the system unusable. On successful exploitation, an attacker can render the system unusable by triggering short dumps on login. This could cause a high impact on availability. Data confidentiality and integrity are not affected. No data can be read, changed or deleted.

AI-Powered Analysis

AILast updated: 07/08/2025, 00:55:43 UTC

Technical Analysis

CVE-2025-42952 is a high-severity vulnerability affecting SAP Business Warehouse (SAP BW) and SAP Plug-In Basis components. The root cause is a missing authorization check (CWE-862) that allows an authenticated attacker with limited privileges to add fields to arbitrary SAP database tables and structures. This unauthorized modification capability can be exploited to disrupt normal system operations. Specifically, the attacker can cause short dumps during user login, rendering the SAP system unusable and severely impacting availability. Notably, the vulnerability does not allow unauthorized reading, modification, or deletion of data, so confidentiality and integrity remain intact. The affected SAP versions include multiple releases of PI_BASIS (from 2006_1_700 through 816) and SAP_BW (700 through 758). The CVSS v3.1 base score is 7.7, reflecting a network attack vector with low attack complexity, requiring privileges but no user interaction, and resulting in a high impact on availability with no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability’s scope is significant due to the widespread use of SAP BW in enterprise data warehousing and analytics, making this a critical availability risk for organizations relying on these SAP components for business operations.

Potential Impact

For European organizations, the impact of this vulnerability is primarily on system availability. SAP Business Warehouse is widely used across industries such as manufacturing, finance, retail, and logistics in Europe for critical data analytics and reporting. An attacker exploiting this flaw could cause login failures and system downtime, disrupting business continuity and operational decision-making. Although data confidentiality and integrity are not compromised, the inability to access SAP BW systems can lead to significant financial losses, regulatory compliance issues, and reputational damage. Organizations with complex SAP landscapes and integrated business processes are particularly vulnerable to operational disruptions. The requirement for authenticated access means insider threats or compromised credentials could be leveraged to exploit this vulnerability, emphasizing the need for strict access controls and monitoring.

Mitigation Recommendations

1. Implement strict role-based access controls (RBAC) to limit permissions for users who can modify SAP database tables and structures, ensuring only trusted administrators have such privileges. 2. Monitor SAP system logs and audit trails for unusual activities related to table or structure modifications, especially attempts to add fields. 3. Apply SAP security notes and patches as soon as they become available from SAP to address this vulnerability. 4. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 5. Conduct regular security assessments and penetration testing focused on SAP authorization configurations to detect and remediate missing or misconfigured authorizations. 6. Prepare incident response plans specifically for SAP availability incidents to minimize downtime if exploitation occurs. 7. Segment SAP BW systems within the network to limit exposure to potentially compromised accounts and reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:39.583Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686c68cc6f40f0eb72eec61d

Added to database: 7/8/2025, 12:39:40 AM

Last enriched: 7/8/2025, 12:55:43 AM

Last updated: 8/16/2025, 7:48:34 PM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats