CVE-2025-42887

9.9 CRITICAL

📋 TL;DR

CVE-2025-42887 is a critical code injection vulnerability in SAP Solution Manager that allows authenticated attackers to execute arbitrary code via remote-enabled function modules. This affects organizations using vulnerable versions of SAP Solution Manager, potentially giving attackers complete system control.

💻 Affected Systems

Products:
  • SAP Solution Manager
Versions: Specific versions as detailed in SAP Note 3668705
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to vulnerable function modules. All standard installations are affected unless patched.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the SAP Solution Manager system leading to full administrative control, data exfiltration, system manipulation, and potential lateral movement to connected SAP systems.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive business data, configuration manipulation, and potential disruption of SAP management operations.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and input validation controls are implemented alongside monitoring.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: As specified in SAP Note 3668705

Vendor Advisory: https://me.sap.com/notes/3668705

Restart Required: Yes

Instructions:

1. Review SAP Note 3668705 for specific patch details. 2. Apply the relevant SAP Security Note via SAP Support Portal. 3. Restart affected SAP Solution Manager services. 4. Verify patch application through transaction SNOTE.

🔧 Temporary Workarounds

Restrict Function Module Access

all

Limit access to vulnerable remote-enabled function modules using SAP authorization concepts

Use transaction SE93 to restrict function module execution
Implement authorization object S_RFC for granular control

Network Segmentation

all

Isolate SAP Solution Manager from untrusted networks and implement strict firewall rules

Configure firewall to restrict RFC connections to trusted IPs only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP Solution Manager from internet and untrusted internal networks
  • Apply principle of least privilege to all user accounts with access to SAP Solution Manager

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3668705 is applied via transaction SNOTE or review system version against affected versions in SAP advisory

Check Version:

Execute transaction SM51 or check system information in SAP GUI

Verify Fix Applied:

Verify SAP Note 3668705 implementation status in transaction SNOTE and confirm no unauthorized RFC calls are occurring

📡 Detection & Monitoring

Log Indicators:

  • Unusual RFC function module calls in security audit logs
  • Multiple failed authorization checks for remote function modules
  • Unexpected system changes following RFC calls

Network Indicators:

  • Unusual RFC traffic patterns to SAP Solution Manager
  • RFC connections from unexpected source IPs

SIEM Query:

source="sap_audit_log" AND (event_type="RFC_CALL" OR function_module="*vulnerable_module*") AND result="SUCCESS" | stats count by user, source_ip

🔗 References

📤 Share & Export