CVE-2025-42882
📋 TL;DR
This vulnerability allows authenticated attackers with basic privileges in SAP NetWeaver Application Server for ABAP to execute a specific function module that retrieves restricted technical information. This information disclosure could help attackers plan subsequent attacks. Only affects SAP NetWeaver ABAP systems with the vulnerable configuration.
💻 Affected Systems
- SAP NetWeaver Application Server for ABAP
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers gather detailed system information to plan targeted attacks, potentially leading to further exploitation of other vulnerabilities in the SAP environment.
Likely Case
Internal users or compromised accounts retrieve technical system details that could assist in reconnaissance for more serious attacks.
If Mitigated
Minimal impact with proper access controls and monitoring, though information disclosure still occurs.
🎯 Exploit Status
Exploitation requires authenticated access and knowledge of the specific vulnerable function module
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: See SAP Note 3643337 for specific patch information
Vendor Advisory: https://me.sap.com/notes/3643337
Restart Required: Yes
Instructions:
1. Review SAP Note 3643337. 2. Apply the relevant SAP Security Note or kernel patch. 3. Restart the SAP system. 4. Verify the fix using transaction ST03N.
🔧 Temporary Workarounds
Restrict Function Module Access
allUse authorization objects to restrict access to the vulnerable function module
Use transaction SE93 or SU24 to adjust authorizations
🧯 If You Can't Patch
- Implement strict access controls and monitor for unauthorized function module execution
- Enhance logging and monitoring for suspicious ABAP function module calls
🔍 How to Verify
Check if Vulnerable:
Check if your SAP system version matches those listed in SAP Note 3643337 and verify if the vulnerable function module is accessible
Check Version:
Use transaction SM51 or run 'disp+work' command in SAP to check kernel version
Verify Fix Applied:
After applying SAP Note 3643337, verify the patch is active using transaction SNOTE and test if the function module no longer discloses restricted information
📡 Detection & Monitoring
Log Indicators:
- Unusual function module calls in security audit log (SM19/SM20)
- Authorization failures for restricted function modules
Network Indicators:
- Unusual RFC calls to SAP system from unexpected sources
SIEM Query:
Search for event IDs related to ABAP function module execution or authorization checks in SAP audit logs