Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42958: CWE-250: Execution with Unnecessary Privileges in SAP_SE SAP NetWeaver

0
Critical
VulnerabilityCVE-2025-42958cvecve-2025-42958cwe-250
Published: Tue Sep 09 2025 (09/09/2025, 02:11:46 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver

Description

Due to a missing authentication check in the SAP NetWeaver application on IBM i-series, the application allows high privileged unauthorized users to read, modify, or delete sensitive information, as well as access administrative or privileged functionalities. This results in a high impact on the confidentiality, integrity, and availability of the application.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:07:05 UTC

Technical Analysis

CVE-2025-42958 is a critical security vulnerability identified in SAP NetWeaver products running on IBM i-series platforms. The root cause is a missing authentication check within the SAP NetWeaver application, which leads to execution with unnecessary privileges (CWE-250). This flaw allows users who already have high privileges but lack proper authentication to bypass security controls and gain unauthorized access to sensitive information and administrative functionalities. Affected versions include KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.53, KERNEL 7.22, and 7.54. The vulnerability has a CVSS v3.1 base score of 9.1, reflecting its critical nature, with attack vector as network (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and scope changed (S:C). The impact covers confidentiality, integrity, and availability, allowing attackers to read, modify, or delete sensitive data and access privileged functions without proper authentication. Although no public exploits have been reported yet, the vulnerability poses a significant risk due to the critical nature of SAP NetWeaver in enterprise environments and the potential for severe business disruption. The vulnerability was reserved in April 2025 and published in September 2025, indicating recent discovery and disclosure. The lack of available patches at the time of reporting necessitates immediate attention to alternative mitigations.

Potential Impact

The vulnerability threatens the confidentiality, integrity, and availability of SAP NetWeaver applications on IBM i-series systems. Successful exploitation could lead to unauthorized disclosure of sensitive business data, unauthorized modification or deletion of critical information, and unauthorized execution of administrative functions. This could disrupt business operations, cause financial losses, damage organizational reputation, and potentially lead to regulatory non-compliance. Given SAP NetWeaver’s widespread use in enterprise resource planning (ERP), supply chain, and financial systems, the impact could cascade across multiple business units and partners. The requirement for high privileges limits exploitation to insiders or compromised accounts, but the missing authentication check significantly lowers the barrier for privilege escalation and lateral movement within affected environments. Organizations relying on these SAP versions face a heightened risk of targeted attacks, especially from advanced persistent threat (APT) actors seeking to exploit critical infrastructure or valuable intellectual property.

Mitigation Recommendations

1. Immediately inventory SAP NetWeaver instances running on IBM i-series to identify affected versions. 2. Apply vendor patches or updates as soon as they become available; monitor SAP security advisories closely. 3. Implement strict access controls and least privilege principles to limit high-privilege user accounts and monitor their activities. 4. Enforce multi-factor authentication (MFA) for all privileged SAP accounts to reduce risk of credential compromise. 5. Use network segmentation and firewall rules to restrict access to SAP NetWeaver management interfaces to trusted hosts only. 6. Enable detailed logging and continuous monitoring of SAP system activities to detect anomalous behavior indicative of exploitation attempts. 7. Conduct regular security audits and penetration testing focusing on authentication and privilege escalation vectors within SAP environments. 8. Educate administrators and users about the risks of privilege misuse and the importance of secure credential management. 9. Prepare incident response plans specific to SAP system compromise scenarios to enable rapid containment and recovery. 10. Consider deploying application-layer firewalls or SAP-specific security tools that can detect and block unauthorized access attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:39.583Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bf8dfad5a2966cfc85818a

Added to database: 9/9/2025, 2:16:26 AM

Last enriched: 2/27/2026, 2:07:05 AM

Last updated: 3/24/2026, 11:05:01 AM

Views: 275

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses