CVE-2025-0053

5.3 MEDIUM

📋 TL;DR

SAP NetWeaver Application Server for ABAP and ABAP Platform contains an information disclosure vulnerability where unauthenticated attackers can access system configuration details via a specific URL parameter. This affects organizations running vulnerable SAP ABAP systems, potentially exposing sensitive configuration data that could aid further attacks.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server for ABAP
  • SAP ABAP Platform
Versions: Specific versions not detailed in advisory; check SAP Note 3536461 for affected versions
Operating Systems: All supported OS platforms for SAP NetWeaver
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in standard configuration; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain detailed system configuration information that could be used to plan targeted attacks, identify other vulnerabilities, or facilitate lateral movement within the SAP environment.

🟠

Likely Case

Attackers gather reconnaissance data about SAP system configuration, version information, and potentially sensitive configuration details that could inform subsequent attacks.

🟢

If Mitigated

Limited information disclosure with minimal impact if proper network segmentation and access controls prevent external access to vulnerable endpoints.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only specific URL parameter manipulation; no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3536461 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3536461

Restart Required: Yes

Instructions:

1. Review SAP Note 3536461 for affected versions and patches. 2. Apply the relevant SAP Security Note via SAP Support Portal. 3. Restart affected SAP instances. 4. Verify patch application via transaction SNOTE.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to SAP NetWeaver systems to trusted IP addresses only

Web Dispatcher Filtering

all

Configure SAP Web Dispatcher to filter or block requests containing the vulnerable URL parameter

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP systems from untrusted networks
  • Deploy web application firewall (WAF) rules to block requests with the vulnerable parameter pattern

🔍 How to Verify

Check if Vulnerable:

Test by attempting to access the vulnerable URL parameter on SAP NetWeaver systems; specific parameter details are in SAP Note 3536461

Check Version:

Execute transaction SM51 or SM50 to check SAP kernel and system version

Verify Fix Applied:

Check transaction SNOTE to verify SAP Note 3536461 is applied, then retest vulnerable URL parameter access

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing the specific vulnerable URL parameter pattern
  • Unusual access patterns to SAP system information endpoints

Network Indicators:

  • HTTP GET requests with suspicious URL parameters to SAP NetWeaver endpoints
  • Repeated information gathering attempts from single sources

SIEM Query:

source="sap_netweaver" AND (url_contains="vulnerable_parameter" OR status_code=200 AND url_path_contains="/sap/bc/")

🔗 References

📤 Share & Export