Skip to main content

CVE-2025-42986: CWE-862: Missing Authorization in SAP_SE SAP NetWeaver and ABAP Platform

Medium
VulnerabilityCVE-2025-42986cvecve-2025-42986cwe-862
Published: Tue Jul 08 2025 (07/08/2025, 00:38:32 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver and ABAP Platform

Description

Due to a missing authorization check in an obsolete RFC enabled function module in SAP BASIS, an authenticated low-privileged attacker could call a Remote Function Call (RFC), potentially accessing restricted system information. This results in low impact on confidentiality, with no impact on integrity or availability of the application.

AI-Powered Analysis

AILast updated: 07/08/2025, 01:25:17 UTC

Technical Analysis

CVE-2025-42986 is a medium-severity vulnerability affecting multiple versions of SAP BASIS within the SAP NetWeaver and ABAP Platform. The root cause is a missing authorization check in an obsolete Remote Function Call (RFC) enabled function module. This flaw allows an authenticated attacker with low privileges to invoke this RFC and potentially access restricted system information that should otherwise be protected. The vulnerability does not impact the integrity or availability of the system, but it does pose a risk to confidentiality by exposing sensitive information. The affected SAP BASIS versions range from 700 through 754, covering a broad spectrum of SAP NetWeaver deployments. Exploitation requires the attacker to have some level of authenticated access, but no user interaction is needed beyond that. The CVSS 3.1 base score is 4.3, reflecting a low complexity attack vector (network), low attack complexity, and limited impact confined to confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-862, indicating missing authorization, which is a common security weakness where access controls are insufficient or absent, allowing unauthorized access to resources or functions.

Potential Impact

For European organizations, the impact primarily concerns confidentiality breaches within SAP environments. SAP systems are widely used across Europe in sectors such as manufacturing, finance, utilities, and public administration, often containing sensitive business data and personally identifiable information (PII). Although the vulnerability does not affect system integrity or availability, unauthorized access to restricted system information could facilitate further reconnaissance or targeted attacks. This could lead to data leakage, compliance violations (e.g., GDPR), and erosion of trust. Given the requirement for authenticated access, the threat is somewhat mitigated by existing access controls, but insider threats or compromised credentials could be leveraged to exploit this vulnerability. Organizations relying heavily on SAP NetWeaver and ABAP platforms, especially those running the affected SAP BASIS versions, are at risk of information disclosure that could aid attackers in planning more damaging intrusions.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Conduct an immediate inventory of SAP BASIS versions in use to identify affected systems. 2) Restrict access to SAP systems by enforcing strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 3) Review and tighten RFC permissions, especially for obsolete or rarely used function modules, to ensure that only authorized users can invoke sensitive RFC calls. 4) Implement SAP security notes and patches as soon as they become available from SAP, even though no patch links are currently provided. 5) Monitor SAP system logs and network traffic for unusual RFC call patterns that could indicate exploitation attempts. 6) Conduct regular security audits and penetration testing focused on SAP environments to detect missing authorization issues proactively. 7) Educate SAP administrators and users about the risks of low-privileged access and the importance of safeguarding credentials.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:48.060Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686c6fc56f40f0eb72ef2e48

Added to database: 7/8/2025, 1:09:25 AM

Last enriched: 7/8/2025, 1:25:17 AM

Last updated: 8/20/2025, 12:50:17 PM

Views: 26

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats