CVE-2025-27428

7.7 HIGH

📋 TL;DR

This directory traversal vulnerability in SAP Solution Manager allows authorized attackers to read files from any connected managed system using RFC-enabled function modules. It affects SAP Solution Manager systems with specific configurations, compromising confidentiality without affecting integrity or availability.

💻 Affected Systems

Products:
  • SAP Solution Manager
Versions: Specific versions as per SAP Note 3581811
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ✅ No
Notes: Requires specific RFC-enabled function module configuration and authorized user access

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains access to sensitive files including configuration files, credentials, business data, and system information from all connected SAP systems, leading to significant data breach.

🟠

Likely Case

Authorized users with malicious intent exploit the vulnerability to access sensitive system files and configuration data from connected managed systems.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to specific authorized users who would need additional privileges to exploit.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authorized user credentials and knowledge of vulnerable function modules

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: As specified in SAP Note 3581811

Vendor Advisory: https://me.sap.com/notes/3581811

Restart Required: Yes

Instructions:

1. Review SAP Note 3581811 for specific patch details. 2. Apply the security patch from SAP Support Portal. 3. Restart affected SAP Solution Manager systems. 4. Verify patch application through transaction SPAM/SAINT.

🔧 Temporary Workarounds

Restrict RFC Function Module Access

all

Limit access to vulnerable RFC-enabled function modules through authorization objects

Configure authorization object S_RFC to restrict access to specific function modules

Network Segmentation

all

Isolate SAP Solution Manager from critical managed systems

Implement firewall rules to restrict RFC traffic between systems

🧯 If You Can't Patch

  • Implement strict access controls and monitor authorized user activities
  • Segment network to limit Solution Manager access to only necessary managed systems

🔍 How to Verify

Check if Vulnerable:

Check if your SAP Solution Manager version matches affected versions in SAP Note 3581811

Check Version:

Execute transaction SM51 or check system information in SAP GUI

Verify Fix Applied:

Verify patch application through transaction SPAM/SAINT and check version matches patched version

📡 Detection & Monitoring

Log Indicators:

  • Unusual RFC function module calls
  • Multiple file access attempts via RFC
  • Authorization failures for restricted function modules

Network Indicators:

  • Abnormal RFC traffic patterns
  • Unexpected file transfer via RFC protocols

SIEM Query:

Search for RFC function module calls with file access patterns in SAP security audit logs

🔗 References

📤 Share & Export