CVE-2025-0056

6.0 MEDIUM

📋 TL;DR

SAP GUI for Java stores user input locally on client PCs, creating a security vulnerability. Attackers with administrative privileges or access to the user's directory can read this cached data, potentially exposing sensitive information. This affects all users of vulnerable SAP GUI for Java versions.

💻 Affected Systems

Products:
  • SAP GUI for Java
Versions: Specific versions not provided in CVE description; check SAP Note 3502459 for details
Operating Systems: All operating systems running SAP GUI for Java
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration where SAP GUI for Java caches user input locally.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Highly sensitive transaction data (like financial records, personal information, or credentials) is exposed from cached user input, leading to significant data breaches.

🟠

Likely Case

Moderately sensitive business data from common transactions is exposed, potentially violating data protection regulations.

🟢

If Mitigated

With proper access controls and patching, only non-critical cached data might be accessible, minimizing confidentiality impact.

🌐 Internet-Facing: LOW - This is a client-side vulnerability requiring local access to the user's machine or directory.
🏢 Internal Only: MEDIUM - Internal attackers with administrative privileges or compromised workstations could exploit this to access cached sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires only file system access to read cached data

Exploitation requires administrative privileges on the target machine or access to the user's directory structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3502459 for specific patched versions

Vendor Advisory: https://me.sap.com/notes/3502459

Restart Required: Yes

Instructions:

1. Review SAP Note 3502459. 2. Apply the recommended SAP GUI for Java patch. 3. Restart affected SAP GUI for Java instances. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Disable local caching

all

Configure SAP GUI for Java to not cache user input locally

Configuration steps would be in SAP GUI for Java settings; consult SAP documentation

Restrict directory permissions

linux/windows

Apply strict file system permissions to SAP GUI for Java user directories

chmod 700 ~/.sap (Linux)
icacls "%USERPROFILE%\.sap" /deny Everyone:F (Windows)

🧯 If You Can't Patch

  • Implement strict access controls on client workstations to prevent unauthorized local access
  • Educate users to avoid entering highly sensitive information in SAP GUI for Java transactions

🔍 How to Verify

Check if Vulnerable:

Check if SAP GUI for Java is installed and if local caching is enabled in its configuration

Check Version:

Check SAP GUI for Java 'About' dialog or consult SAP documentation for version checking

Verify Fix Applied:

Verify the patch version matches the one specified in SAP Note 3502459 and test that user input is no longer cached locally

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to SAP GUI for Java cache directories in system logs

Network Indicators:

  • None - this is a local file system vulnerability

SIEM Query:

Search for file access events to SAP GUI for Java cache directories by non-standard users or processes

🔗 References

📤 Share & Export