CVE-2025-42877

7.5 HIGH

📋 TL;DR

CVE-2025-42877 is a memory corruption vulnerability in SAP Web Dispatcher, Internet Communication Manager (ICM), and SAP Content Server that allows unauthenticated attackers to cause denial of service. This affects availability of SAP systems but doesn't compromise data confidentiality or integrity. All organizations running vulnerable versions of these SAP components are affected.

💻 Affected Systems

Products:
  • SAP Web Dispatcher
  • SAP Internet Communication Manager (ICM)
  • SAP Content Server
Versions: Specific versions not provided in CVE description; check SAP Note 3677544 for details
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects standard configurations; no special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash leading to extended downtime of critical SAP services, disrupting business operations.

🟠

Likely Case

Service disruption causing temporary unavailability of SAP applications, requiring system restart.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation allows remote attackers to target exposed systems directly.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Logical errors leading to memory corruption typically require less sophisticated exploitation than buffer overflows.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3677544 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3677544

Restart Required: Yes

Instructions:

1. Review SAP Note 3677544 for specific patch details. 2. Apply SAP Security Patch Day updates. 3. Restart affected SAP services. 4. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SAP Web Dispatcher, ICM, and Content Server to trusted sources only.

Use firewall rules to limit access to SAP ports (e.g., 80, 443, 8100, 50000-50099)

Access Control Lists

all

Implement IP-based access controls on SAP components to limit potential attackers.

Configure SAP Web Dispatcher ACLs via parameter icm/HTTP/acl_file

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP components from untrusted networks
  • Deploy web application firewalls (WAF) with SAP-specific rules to filter malicious traffic

🔍 How to Verify

Check if Vulnerable:

Check SAP system version against patched versions in SAP Note 3677544

Check Version:

For SAP BASIS: disp+work -version or check SAP kernel version

Verify Fix Applied:

Verify patch application through SAP transaction SPAM/SAINT and confirm version updates

📡 Detection & Monitoring

Log Indicators:

  • Multiple connection attempts causing abnormal termination
  • SAP process crashes in system logs
  • Increased error messages in dev_trace or dev_w0 files

Network Indicators:

  • Unusual traffic patterns to SAP Web Dispatcher/ICM ports
  • Multiple rapid connections from single sources

SIEM Query:

source="sap_logs" AND ("abnormal termination" OR "memory corruption" OR "segmentation fault")

🔗 References

📤 Share & Export