CVE-2025-30012

10.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary operating system commands as SAP Administrator on SAP SRM systems using the deprecated Java applet component in Live Auction Cockpit. The deserialization flaw enables complete system compromise affecting all organizations running vulnerable SAP SRM versions. Attackers can gain full administrative control over the application server.

💻 Affected Systems

Products:
  • SAP Supplier Relationship Management (SRM)
Versions: Specific versions not provided in CVE description; check SAP Note 3578900 for exact affected versions
Operating Systems: Any OS running SAP SRM
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Live Auction Cockpit component with deprecated Java applet functionality enabled

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with SAP Administrator privileges leading to data theft, system destruction, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Attackers exploit the vulnerability to deploy ransomware, steal sensitive supplier and procurement data, or use the compromised system as a foothold for further attacks.

🟢

If Mitigated

With proper network segmentation and strict firewall rules, impact is limited to the SAP SRM application server only, preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated RCE with CVSS 10.0 suggests relatively straightforward exploitation once technical details are known

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3578900 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3578900

Restart Required: Yes

Instructions:

1. Review SAP Note 3578900 for exact patch details. 2. Apply the SAP Security Patch from SAP Support Portal. 3. Restart the SAP SRM application server. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Disable Live Auction Cockpit Java Applet

all

Disable or remove the deprecated Java applet component from Live Auction Cockpit functionality

Specific SAP transaction codes or configuration changes required - consult SAP documentation

Network Segmentation

all

Isolate SAP SRM servers from internet and restrict internal access to authorized users only

Firewall rules to block external access to SAP SRM ports
Implement network ACLs to restrict internal access

🧯 If You Can't Patch

  • Immediately isolate the SAP SRM server from all network access except absolutely necessary administrative connections
  • Implement application-level WAF rules to block malicious payloads targeting the deserialization endpoint

🔍 How to Verify

Check if Vulnerable:

Check if Live Auction Cockpit with Java applet is enabled in SAP SRM configuration and verify version against SAP Note 3578900

Check Version:

Use SAP transaction code SM51 or check system information in SAP GUI

Verify Fix Applied:

Verify patch application via SAP Note 3578900 implementation check and test that malicious payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual Java deserialization errors in SAP application logs
  • Unexpected OS command execution from SAP processes
  • Multiple failed authentication attempts followed by successful exploitation

Network Indicators:

  • Unusual HTTP requests to Live Auction Cockpit endpoints with encoded payloads
  • Outbound connections from SAP server to suspicious external IPs

SIEM Query:

source="sap_logs" AND ("deserialization" OR "Live Auction" OR "java.applet") AND severity=HIGH

🔗 References

📤 Share & Export