CVE-2025-0064

8.7 HIGH

📋 TL;DR

This vulnerability in SAP BusinessObjects Business Intelligence platform allows administrators to generate or retrieve a secret passphrase that enables impersonation of any user. This compromises both confidentiality and integrity by allowing unauthorized access to sensitive data and system functions. Only systems running the affected SAP BusinessObjects Central Management Console are impacted.

💻 Affected Systems

Products:
  • SAP BusinessObjects Business Intelligence platform
Versions: Specific versions as detailed in SAP Note 3525794
Operating Systems: All supported OS for SAP BusinessObjects
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin access to Central Management Console; default installations are vulnerable if admin credentials are compromised.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin access could impersonate any user, including privileged accounts, to access sensitive business data, modify critical configurations, or exfiltrate confidential information without detection.

🟠

Likely Case

Malicious insider or compromised admin account uses the vulnerability to escalate privileges, access unauthorized data, or bypass audit controls while appearing as legitimate users.

🟢

If Mitigated

With strict access controls, monitoring, and proper patch management, the impact is limited to detection of unauthorized admin activities before exploitation occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires admin-level access to the Central Management Console interface; no public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: As specified in SAP Note 3525794

Vendor Advisory: https://me.sap.com/notes/3525794

Restart Required: No

Instructions:

1. Review SAP Note 3525794 for specific patch details. 2. Apply the security patch through your SAP maintenance system. 3. Verify patch installation through version checks. 4. Test functionality in non-production environment first.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to Central Management Console to only essential personnel using principle of least privilege.

Enhanced Monitoring

all

Implement enhanced logging and monitoring for admin activities in Central Management Console, especially passphrase generation/retrieval actions.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for all admin accounts with Central Management Console access
  • Segment network to isolate Central Management Console from general user access and implement additional authentication factors

🔍 How to Verify

Check if Vulnerable:

Check SAP Note 3525794 for affected version ranges and compare with your installed BusinessObjects version.

Check Version:

Check version through Central Management Console interface or SAP administration tools specific to your deployment.

Verify Fix Applied:

Verify patch installation through SAP maintenance tools and confirm version is updated beyond vulnerable ranges specified in SAP Note 3525794.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin activities in Central Management Console logs
  • Passphrase generation or retrieval events
  • User impersonation attempts

Network Indicators:

  • Unusual authentication patterns from admin accounts
  • Access to sensitive data by unexpected user accounts

SIEM Query:

Search for 'passphrase generation' or 'user impersonation' events in SAP BusinessObjects audit logs combined with admin user activities.

🔗 References

📤 Share & Export