Skip to main content

CVE-2025-42983: CWE-862: Missing Authorization in SAP_SE SAP Business Warehouse and SAP Plug-In Basis

High
VulnerabilityCVE-2025-42983cvecve-2025-42983cwe-862
Published: Tue Jun 10 2025 (06/10/2025, 00:11:14 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Business Warehouse and SAP Plug-In Basis

Description

SAP Business Warehouse and SAP Plug-In Basis allows an authenticated attacker to drop arbitrary SAP database tables, potentially resulting in a loss of data or rendering the system unusable. On successful exploitation, an attacker can completely delete database entries but is not able to read any data.

AI-Powered Analysis

AILast updated: 07/11/2025, 00:31:34 UTC

Technical Analysis

CVE-2025-42983 is a high-severity vulnerability affecting SAP Business Warehouse (SAP_BW) and SAP Plug-In Basis components, specifically versions ranging from PI_BASIS 2006_1_700 through 915 and SAP_BW versions 750 through 758. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. This flaw allows an authenticated attacker with at least low privileges (PR:L) to bypass authorization controls and perform unauthorized destructive actions on the SAP database. Specifically, the attacker can drop arbitrary SAP database tables, leading to the deletion of critical data entries. Although the attacker cannot read or exfiltrate data, the ability to delete database tables can cause significant disruption, including data loss and potentially rendering the SAP system unusable. The vulnerability has a CVSS v3.1 base score of 8.5, indicating a high severity level. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and does not require user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. The impact on confidentiality is none (C:N), but there is a low impact on integrity (I:L) and a high impact on availability (A:H). No known exploits are reported in the wild as of the publication date (June 10, 2025). The root cause is missing authorization checks in the SAP_SE components, allowing authenticated users to perform unauthorized destructive operations on the database tables.

Potential Impact

For European organizations, the impact of CVE-2025-42983 can be severe, especially for enterprises relying heavily on SAP Business Warehouse and SAP Plug-In Basis for critical business intelligence, reporting, and data warehousing functions. Successful exploitation could lead to significant operational disruption due to loss of critical business data and system downtime. This could affect financial reporting, supply chain management, and other key business processes dependent on SAP BW data integrity and availability. The inability to read data limits data breach risks but does not mitigate the operational and reputational damage caused by data destruction. Organizations in sectors such as manufacturing, finance, retail, and utilities, which commonly use SAP BW in Europe, could face regulatory scrutiny under GDPR if data availability impacts customer or personal data processing. Additionally, recovery from such an attack may require extensive restoration efforts from backups, potentially incurring high costs and prolonged downtime.

Mitigation Recommendations

1. Immediate patching or upgrading to SAP versions where this vulnerability is fixed is the most effective mitigation. Since no patch links are provided, organizations should monitor SAP Security Notes and apply updates as soon as they become available. 2. Restrict SAP BW and SAP Plug-In Basis access strictly to trusted and necessary personnel, enforcing the principle of least privilege to minimize the risk of an authenticated attacker exploiting this flaw. 3. Implement robust monitoring and alerting on SAP database table modification and deletion activities to detect anomalous behavior early. 4. Conduct regular audits of SAP user permissions and roles to ensure no excessive privileges are granted that could facilitate exploitation. 5. Maintain comprehensive and tested backups of SAP BW databases and configurations to enable rapid recovery in case of data deletion. 6. Employ network segmentation and access controls to limit exposure of SAP systems to only authorized internal networks and users. 7. Consider deploying SAP-specific security tools that can enforce authorization policies and detect unauthorized operations at the application layer. 8. Educate SAP administrators and users about this vulnerability and the importance of secure authentication and authorization practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:48.060Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f551b0bd07c3938a25e

Added to database: 6/10/2025, 6:54:13 PM

Last enriched: 7/11/2025, 12:31:34 AM

Last updated: 8/1/2025, 5:04:29 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats