CVE-2025-23193

5.3 MEDIUM

📋 TL;DR

CVE-2025-23193 is an information disclosure vulnerability in SAP NetWeaver Server ABAP that allows unauthenticated attackers to determine whether specific user accounts exist by observing server response differences. This affects organizations running vulnerable SAP NetWeaver ABAP systems, potentially exposing user enumeration data.

💻 Affected Systems

Products:
  • SAP NetWeaver Server ABAP
Versions: Specific versions not detailed in advisory; check SAP Note 3561264
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects standard SAP NetWeaver ABAP installations; requires no special configuration to be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate valid user accounts, facilitating targeted credential attacks or social engineering campaigns against identified users.

🟠

Likely Case

Attackers discover valid usernames, enabling more focused brute-force or phishing attacks against those accounts.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to enumeration of accounts that may already be known through other means.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted requests and analyzing response differences; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3561264

Vendor Advisory: https://me.sap.com/notes/3561264

Restart Required: Yes

Instructions:

1. Download SAP Note 3561264 from SAP Support Portal. 2. Apply the correction instructions per SAP standard procedures. 3. Restart affected SAP systems.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to SAP NetWeaver ABAP systems to trusted IP addresses only

Web Application Firewall Rules

all

Configure WAF to block requests that appear to be user enumeration attempts

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to SAP systems
  • Monitor for unusual authentication patterns and user enumeration attempts

🔍 How to Verify

Check if Vulnerable:

Test by sending requests with different usernames and observing response differences; consult SAP Note 3561264 for specific testing guidance.

Check Version:

Transaction ST03N in SAP system to check applied notes and versions

Verify Fix Applied:

Verify SAP Note 3561264 is applied in system and test that user enumeration no longer works.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts with different usernames
  • Unusual pattern of requests to user-related endpoints

Network Indicators:

  • Repeated requests to SAP authentication endpoints from single sources
  • Pattern of requests with incremental username variations

SIEM Query:

source="sap_netweaver" AND (event_type="authentication" OR uri="*/sap/*/user*") AND count by src_ip > threshold

🔗 References

📤 Share & Export