CVE-2025-23190

4.3 MEDIUM

📋 TL;DR

This CVE describes an authorization bypass vulnerability in SAP systems where authenticated users can access unauthorized data through a remote-enabled function module. The vulnerability allows data exposure but not modification or system disruption. It affects SAP systems with the vulnerable function module enabled.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server ABAP
Versions: Specific versions not detailed in CVE; check SAP Note 3547581 for exact affected versions
Operating Systems: All operating systems running SAP ABAP systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the vulnerable function module to be remote-enabled and accessible to authenticated users

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attackers could access sensitive business data, customer information, or proprietary data they shouldn't have access to, potentially leading to data breaches and compliance violations.

🟠

Likely Case

Internal users with legitimate access could exploit this to view data beyond their authorized scope, potentially accessing HR records, financial data, or customer information.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to authorized users accessing some additional data they shouldn't see.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of the vulnerable function module

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3547581

Vendor Advisory: https://me.sap.com/notes/3547581

Restart Required: Yes

Instructions:

1. Download SAP Note 3547581 from SAP Support Portal
2. Apply the note using SAP Note Assistant or transaction SNOTE
3. Restart the SAP system to activate the fix

🔧 Temporary Workarounds

Disable vulnerable function module

all

Deactivate remote access to the specific function module identified in SAP Note 3547581

Use transaction SE37 to find and deactivate the function module's remote-enabled flag

Implement authorization checks

all

Add explicit authorization checks in the function module code

Modify function module to include AUTHORITY-CHECK statements before sensitive operations

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to SAP systems
  • Enforce principle of least privilege for all user accounts and regularly audit access

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3547581 is applied using transaction SNOTE or check the function module's remote-enabled status in SE37

Check Version:

Use transaction SM51 to check SAP kernel version and system details

Verify Fix Applied:

Verify SAP Note 3547581 is successfully applied and test that unauthorized users cannot access the function module

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to function modules in security audit log (SM20)
  • Multiple failed authorization checks followed by successful access

Network Indicators:

  • Unusual RFC calls to the vulnerable function module from unexpected sources

SIEM Query:

source="SAP" AND (event_type="function_module_call" OR event_type="authorization_failure") AND function_module="[VULNERABLE_MODULE_NAME]"

🔗 References

📤 Share & Export