Skip to main content

CVE-2025-42993: CWE-862: Missing Authorization in SAP_SE SAP S/4HANA (Enterprise Event Enablement)

Medium
VulnerabilityCVE-2025-42993cvecve-2025-42993cwe-862
Published: Tue Jun 10 2025 (06/10/2025, 00:13:15 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP S/4HANA (Enterprise Event Enablement)

Description

Due to a missing authorization check vulnerability in SAP S/4HANA (Enterprise Event Enablement), an attacker with access to the Inbound Binding Configuration could create an RFC destination and assign an arbitrary high-privilege user. This allows the attacker to consume events via the RFC destination, leading to code execution under the privileges of the assigned high-privilege user. While the vulnerability has a low impact on Availability, it significantly poses a high risk to both Confidentiality and Integrity.

AI-Powered Analysis

AILast updated: 07/11/2025, 00:32:25 UTC

Technical Analysis

CVE-2025-42993 is a vulnerability identified in SAP S/4HANA's Enterprise Event Enablement component, specifically affecting versions SAP_GWFND 757 and 758. The root cause is a missing authorization check (CWE-862) in the Inbound Binding Configuration functionality. An attacker who already has some level of privileged access (high privilege required) can exploit this flaw by creating an RFC (Remote Function Call) destination and assigning it an arbitrary high-privilege user. This misconfiguration allows the attacker to consume events through the RFC destination and execute code with the privileges of the assigned high-privilege user. The vulnerability primarily impacts confidentiality and integrity, as it enables unauthorized code execution under elevated privileges, potentially leading to data exfiltration, unauthorized data modification, or further compromise of the SAP environment. The impact on availability is low, meaning the system's uptime or service continuity is less likely to be affected. The CVSS v3.1 base score is 6.7 (medium severity), reflecting the network attack vector, low attack complexity, requirement for high privileges, no user interaction, and high impact on confidentiality and integrity. No known exploits are currently reported in the wild, but the vulnerability's nature makes it a significant risk for organizations relying on SAP S/4HANA for critical enterprise resource planning and event-driven business processes.

Potential Impact

For European organizations, the exploitation of this vulnerability could have serious consequences. SAP S/4HANA is widely used across various industries in Europe, including manufacturing, finance, utilities, and public sector entities. Unauthorized code execution with high privileges could lead to theft or manipulation of sensitive business data, disruption of business workflows, and potential compliance violations under regulations such as GDPR. The confidentiality breach could expose personal data or intellectual property, while integrity violations might corrupt financial records or operational data, undermining trust and operational reliability. Although availability impact is low, the indirect effects of data breaches or integrity compromises could cause operational delays and reputational damage. Given the critical role SAP systems play in European enterprises, this vulnerability represents a significant risk vector that could be leveraged in targeted attacks or insider threat scenarios.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict access to the Inbound Binding Configuration interface to only the most trusted and necessary administrators, minimizing the number of users with high privileges. 2) Implement strict role-based access controls (RBAC) and regularly audit user privileges to ensure no excessive permissions are granted that could be exploited. 3) Monitor and log all changes to RFC destinations and event enablement configurations to detect unauthorized modifications promptly. 4) Apply SAP security notes and patches as soon as they become available from SAP, even though no patch links are currently provided, maintaining close communication with SAP support channels. 5) Conduct regular security assessments and penetration tests focusing on SAP S/4HANA components to identify potential misconfigurations or privilege escalations. 6) Employ network segmentation and firewall rules to limit the exposure of SAP RFC interfaces to only trusted network segments and systems. 7) Educate SAP administrators about the risks of improper configuration and the importance of adhering to the principle of least privilege.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:50.941Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f551b0bd07c3938a2ca

Added to database: 6/10/2025, 6:54:13 PM

Last enriched: 7/11/2025, 12:32:25 AM

Last updated: 8/13/2025, 7:59:02 AM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats