Skip to main content

CVE-2025-43010: CWE-94: Improper Control of Generation of Code in SAP_SE SAP S/4HANA Cloud Private Edition or on Premise (SCM Master Data Layer (MDL))

High
VulnerabilityCVE-2025-43010cvecve-2025-43010cwe-94
Published: Tue May 13 2025 (05/13/2025, 00:19:51 UTC)
Source: CVE
Vendor/Project: SAP_SE
Product: SAP S/4HANA Cloud Private Edition or on Premise (SCM Master Data Layer (MDL))

Description

SAP S/4HANA Cloud Private Edition or on Premise (SCM Master Data Layer (MDL)) allows an authenticated attacker with SAP standard authorization to execute a certain function module remotely and replace arbitrary ABAP programs, including SAP standard programs. This is due to lack of input validation and no authorization checks. This has low Confidentiality impact but high impact on integrity and availability to the application.

AI-Powered Analysis

AILast updated: 07/12/2025, 01:47:17 UTC

Technical Analysis

CVE-2025-43010 is a high-severity vulnerability affecting SAP S/4HANA Cloud Private Edition and On-Premise deployments, specifically within the Supply Chain Management (SCM) Master Data Layer (MDL). The vulnerability arises from improper control over code generation (CWE-94), allowing an authenticated attacker with SAP standard authorization to remotely invoke a specific function module that lacks proper input validation and authorization checks. This flaw enables the attacker to replace arbitrary ABAP programs, including critical SAP standard programs. The exploitation does not require user interaction and can be performed remotely over the network, with low attack complexity and privileges limited to standard SAP authorization. The impact on confidentiality is low, but the integrity and availability of the affected SAP application are severely compromised, as malicious code can be injected or legitimate code replaced, potentially disrupting business processes or causing denial of service. The vulnerability affects multiple versions of SAP S/4HANA SCM components, including S4CORE versions 102 through 108 and SCM_BASIS versions 700 through 714. Although no known exploits are currently reported in the wild, the high CVSS score of 8.3 reflects the significant risk posed by this vulnerability due to the critical role SAP S/4HANA plays in enterprise resource planning and supply chain operations. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation efforts.

Potential Impact

For European organizations, the impact of CVE-2025-43010 is substantial given the widespread adoption of SAP S/4HANA in industries such as manufacturing, logistics, retail, and finance. The ability for an attacker to replace ABAP programs can lead to unauthorized manipulation of supply chain data, disruption of critical business workflows, and potential downtime of essential services. This can result in financial losses, regulatory compliance violations (e.g., GDPR if personal data is affected indirectly), and reputational damage. The integrity compromise may allow attackers to introduce fraudulent transactions or alter master data, while availability impacts could halt operations dependent on SCM processes. Given the interconnected nature of supply chains in Europe, a successful attack could also have cascading effects on partners and customers. The requirement for standard SAP authorization limits the attack surface but does not eliminate risk, as insider threats or compromised credentials could be leveraged. The absence of known exploits currently provides a window for proactive defense, but the vulnerability's severity demands urgent attention.

Mitigation Recommendations

1. Immediate review and restriction of SAP standard authorizations to the minimum necessary, especially for users with access to SCM Master Data Layer functions. 2. Implement strict monitoring and auditing of function module executions and ABAP program changes to detect unauthorized modifications promptly. 3. Apply SAP security notes and patches as soon as they become available; maintain close communication with SAP support channels for updates on this vulnerability. 4. Employ network segmentation and access controls to limit exposure of SAP systems to trusted internal networks and VPNs only. 5. Conduct regular security assessments and penetration testing focused on SAP environments to identify and remediate privilege escalation or code injection risks. 6. Enhance credential management practices, including multi-factor authentication for SAP user accounts with elevated privileges, to reduce the risk of credential compromise. 7. Develop and test incident response plans specific to SAP system compromises to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:53.589Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd64d2

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/12/2025, 1:47:17 AM

Last updated: 8/7/2025, 2:48:02 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats