CVE-2025-42882

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers with basic privileges in SAP NetWeaver Application Server for ABAP to execute a specific function module that retrieves restricted technical information. This information disclosure could help attackers plan subsequent attacks. Only affects SAP NetWeaver ABAP systems with the vulnerable configuration.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server for ABAP
Versions: Specific versions mentioned in SAP Note 3643337
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with basic privileges; affects standard SAP NetWeaver ABAP installations

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gather detailed system information to plan targeted attacks, potentially leading to further exploitation of other vulnerabilities in the SAP environment.

🟠

Likely Case

Internal users or compromised accounts retrieve technical system details that could assist in reconnaissance for more serious attacks.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring, though information disclosure still occurs.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of the specific vulnerable function module

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See SAP Note 3643337 for specific patch information

Vendor Advisory: https://me.sap.com/notes/3643337

Restart Required: Yes

Instructions:

1. Review SAP Note 3643337. 2. Apply the relevant SAP Security Note or kernel patch. 3. Restart the SAP system. 4. Verify the fix using transaction ST03N.

🔧 Temporary Workarounds

Restrict Function Module Access

all

Use authorization objects to restrict access to the vulnerable function module

Use transaction SE93 or SU24 to adjust authorizations

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized function module execution
  • Enhance logging and monitoring for suspicious ABAP function module calls

🔍 How to Verify

Check if Vulnerable:

Check if your SAP system version matches those listed in SAP Note 3643337 and verify if the vulnerable function module is accessible

Check Version:

Use transaction SM51 or run 'disp+work' command in SAP to check kernel version

Verify Fix Applied:

After applying SAP Note 3643337, verify the patch is active using transaction SNOTE and test if the function module no longer discloses restricted information

📡 Detection & Monitoring

Log Indicators:

  • Unusual function module calls in security audit log (SM19/SM20)
  • Authorization failures for restricted function modules

Network Indicators:

  • Unusual RFC calls to SAP system from unexpected sources

SIEM Query:

Search for event IDs related to ABAP function module execution or authorization checks in SAP audit logs

🔗 References

📤 Share & Export