Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42989: CWE-862: Missing Authorization in SAP_SE SAP NetWeaver Application Server for ABAP

0
Critical
VulnerabilityCVE-2025-42989cvecve-2025-42989cwe-862
Published: Tue Jun 10 2025 (06/10/2025, 00:12:16 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver Application Server for ABAP

Description

RFC inbound processing�does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation the attacker could critically impact both integrity and availability of the application.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:07:41 UTC

Technical Analysis

CVE-2025-42989 is a vulnerability classified under CWE-862 (Missing Authorization) found in SAP NetWeaver Application Server for ABAP, specifically in the RFC inbound processing component. This vulnerability occurs because the system fails to perform necessary authorization checks for authenticated users attempting to invoke RFC calls. As a result, an attacker who has valid credentials but limited privileges can exploit this flaw to escalate their privileges beyond their assigned roles. The vulnerability affects multiple versions of the SAP kernel (7.89, 7.93, 9.14, and 9.15). The attack vector is network-based, requiring only that the attacker be authenticated, with no user interaction needed. The vulnerability impacts the integrity and availability of the SAP applications, potentially allowing attackers to execute unauthorized commands, modify data, or disrupt services. The CVSS 3.1 score of 9.6 reflects the critical nature of this vulnerability, emphasizing its ease of exploitation and severe impact. Although no public exploits are known at this time, the criticality and widespread use of SAP NetWeaver make this a significant threat. SAP has not yet published patches, so organizations must monitor for updates and consider interim mitigations.

Potential Impact

The exploitation of CVE-2025-42989 can lead to severe consequences for organizations using SAP NetWeaver Application Server for ABAP. Attackers can escalate privileges from a limited authenticated user to higher privilege levels, enabling unauthorized access to sensitive business data and critical system functions. This can result in data integrity violations, such as unauthorized data modification or deletion, and availability issues, including service disruption or denial of service. Given SAP's role in enterprise resource planning and critical business operations, such impacts can cause operational downtime, financial loss, regulatory non-compliance, and reputational damage. The vulnerability's network-based attack vector and lack of required user interaction increase the likelihood of exploitation in environments where user credentials are compromised or weakly protected. Organizations with complex SAP landscapes and integrated business processes are particularly at risk, as attackers could leverage this vulnerability to move laterally and escalate attacks within the enterprise.

Mitigation Recommendations

To mitigate CVE-2025-42989, organizations should prioritize the following actions: 1) Monitor SAP Security Notes and apply official patches from SAP as soon as they become available for the affected kernel versions. 2) Restrict and tightly control access to SAP RFC interfaces by implementing strict network segmentation and firewall rules to limit inbound RFC traffic to trusted sources only. 3) Enforce strong authentication mechanisms, including multi-factor authentication (MFA), for all SAP users to reduce the risk of credential compromise. 4) Conduct thorough reviews and audits of user roles and authorizations within SAP to minimize excessive privileges and ensure the principle of least privilege is applied. 5) Implement continuous monitoring and anomaly detection on SAP systems to identify unusual RFC activity or privilege escalations promptly. 6) Consider deploying SAP's security tools and logging capabilities to enhance visibility into RFC calls and user actions. 7) Educate SAP administrators and security teams about this vulnerability and the importance of rapid response to suspicious activities. These targeted measures go beyond generic advice by focusing on controlling the specific attack vector and limiting the impact of potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:48.060Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f541b0bd07c3938a037

Added to database: 6/10/2025, 6:54:12 PM

Last enriched: 2/27/2026, 2:07:41 AM

Last updated: 3/23/2026, 5:02:15 PM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses