CVE-2025-42883

2.7 LOW

📋 TL;DR

SAP NetWeaver Application Server for ABAP's Migration Workbench fails to scan uploaded files for malware when an administrator uploads them. This allows privileged attackers to upload malicious files, compromising system integrity. Only SAP systems using the affected Migration Workbench component are vulnerable.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server for ABAP
Versions: Specific versions not detailed in CVE; check SAP Note 3634053
Operating Systems: Any OS running SAP NetWeaver ABAP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative privileges in Migration Workbench (DX Workbench) component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator uploads malware that compromises the SAP system, potentially leading to data theft, system disruption, or lateral movement within the network.

🟠

Likely Case

Malicious administrator uploads malware that remains undetected, potentially creating backdoors or executing unauthorized code within the SAP environment.

🟢

If Mitigated

With proper administrative controls and monitoring, the risk is limited to authorized administrators who would be detected if they abused their privileges.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative access to the Migration Workbench, making it accessible only to authorized users with elevated privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3634053 for specific patch details

Vendor Advisory: https://me.sap.com/notes/3634053

Restart Required: Yes

Instructions:

1. Review SAP Note 3634053. 2. Apply the relevant SAP Security Patch Day updates. 3. Restart the SAP system as required.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative privileges to Migration Workbench to only trusted users.

Implement File Upload Monitoring

all

Monitor file uploads in Migration Workbench logs for suspicious activity.

🧯 If You Can't Patch

  • Enforce strict access controls to limit Migration Workbench administrative privileges.
  • Implement additional malware scanning for uploaded files using external tools.

🔍 How to Verify

Check if Vulnerable:

Check if your SAP NetWeaver ABAP system uses Migration Workbench and review SAP Note 3634053 for affected versions.

Check Version:

Use SAP transaction SM51 or check system info in SAP GUI.

Verify Fix Applied:

Verify that SAP Security Patch Day updates have been applied and confirm with SAP Note 3634053.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads via Migration Workbench by administrators
  • Lack of malware scan logs for uploaded files

Network Indicators:

  • Unexpected outbound connections from SAP server post-file upload

SIEM Query:

source="sap_logs" AND event="file_upload" AND user_role="admin" AND scan_status="missing"

🔗 References

📤 Share & Export