CVE-2025-25243

8.6 HIGH

📋 TL;DR

CVE-2025-25243 is an unauthenticated arbitrary file download vulnerability in SAP Supplier Relationship Management's Master Data Management Catalog. An attacker can exploit a publicly available servlet to download any file from the system without authentication, potentially exposing sensitive configuration files, credentials, or business data. All organizations running vulnerable SAP SRM MDM Catalog versions are affected.

💻 Affected Systems

Products:
  • SAP Supplier Relationship Management (SRM)
  • SAP Master Data Management (MDM) Catalog
Versions: Specific versions not detailed in provided references; consult SAP Note 3567551 for exact affected versions
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in a publicly available servlet that appears to be enabled by default in affected configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through extraction of configuration files containing database credentials, encryption keys, or administrative passwords, leading to further attacks on connected systems.

🟠

Likely Case

Exfiltration of sensitive business data, customer information, or internal documents stored in accessible file paths, resulting in data breach and regulatory compliance violations.

🟢

If Mitigated

Limited exposure of non-sensitive files if proper file system permissions and network segmentation are implemented, though vulnerability still exists.

🌐 Internet-Facing: HIGH - The vulnerability requires no authentication and can be exploited remotely over the network, making internet-facing instances immediate targets.
🏢 Internal Only: HIGH - Even internally, any user on the network could exploit this to access sensitive files without authorization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to the vulnerable servlet endpoint and knowledge of file paths to download. No authentication or user interaction needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3567551

Vendor Advisory: https://me.sap.com/notes/3567551

Restart Required: No

Instructions:

1. Download SAP Note 3567551 from the SAP Support Portal. 2. Apply the correction instructions provided in the note. 3. Verify the servlet is no longer accessible or properly secured.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to the vulnerable servlet endpoint using firewall rules or network segmentation

Servlet Disablement

SAP

Disable or remove the vulnerable servlet if not required for business operations

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP SRM systems from untrusted networks
  • Deploy web application firewall (WAF) rules to block requests to the vulnerable servlet endpoint

🔍 How to Verify

Check if Vulnerable:

Attempt to access the vulnerable servlet endpoint via HTTP request and check if file download is possible without authentication

Check Version:

Check SAP system version via transaction code SM51 or consult SAP Note 3567551 for specific version requirements

Verify Fix Applied:

After applying SAP Note 3567551, verify the servlet endpoint no longer allows unauthenticated file downloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns via servlet endpoints
  • Multiple failed or successful file download attempts from single IPs
  • Access to sensitive file paths via web requests

Network Indicators:

  • HTTP requests to known vulnerable servlet endpoints
  • Unusual outbound data transfers following servlet access

SIEM Query:

source="sap_logs" AND (uri CONTAINS "/servlet/path" OR action="file_download") AND user="anonymous"

🔗 References

📤 Share & Export