CVE-2025-42891

5.5 MEDIUM

📋 TL;DR

CVE-2025-42891 is a missing authorization vulnerability in SAP Enterprise Search for ABAP that allows authenticated attackers with high privileges to read and export database table contents into ABAP reports. This primarily affects organizations using SAP Enterprise Search for ABAP with insufficient authorization controls. The vulnerability has high impact on data confidentiality but no impact on availability.

💻 Affected Systems

Products:
  • SAP Enterprise Search for ABAP
Versions: Specific versions not detailed in CVE; consult SAP Note 3659117 for exact affected versions
Operating Systems: All platforms running SAP Enterprise Search for ABAP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have high privileges; standard authorization configurations may be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive business data, customer information, or intellectual property could be extracted from database tables and exported, leading to significant data breaches and regulatory violations.

🟠

Likely Case

Privileged users could access and export data beyond their intended authorization scope, potentially exposing sensitive operational or financial information.

🟢

If Mitigated

With proper authorization controls and least privilege principles, impact is limited to authorized data access only.

🌐 Internet-Facing: LOW - This requires authenticated access with high privileges, making internet-facing exploitation unlikely unless combined with other vulnerabilities.
🏢 Internal Only: HIGH - Internal users with elevated privileges pose the primary risk, especially in environments with insufficient authorization controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Exploitation requires high privileges but is technically straightforward once authenticated.

Exploitation requires existing high-privilege access; no public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to SAP Note 3659117 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3659117

Restart Required: Yes

Instructions:

1. Review SAP Note 3659117 for specific patch details. 2. Apply the SAP Security Patch Day updates. 3. Restart affected SAP systems. 4. Verify authorization checks are properly implemented.

🔧 Temporary Workarounds

Authorization Restriction

all

Implement strict authorization controls to limit access to SAP Enterprise Search functionality

Use SAP transaction SU24 to maintain authorization objects
Review and restrict S_RS_ADMWB authorizations

Privilege Reduction

all

Apply principle of least privilege to user accounts with access to SAP Enterprise Search

Use transaction PFCG to review and modify role authorizations
Remove unnecessary S_RS_ADMWB authorizations from user roles

🧯 If You Can't Patch

  • Implement strict access controls and review all users with S_RS_ADMWB authorizations
  • Enable detailed logging for SAP Enterprise Search activities and monitor for unauthorized data exports

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3659117 is applied using transaction SNOTE or review system version against SAP Security Patch Day updates

Check Version:

Use SAP transaction SM51 to check system information or review SAP Note implementation status

Verify Fix Applied:

Verify SAP Note 3659117 implementation status and test authorization controls for SAP Enterprise Search functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual database table access patterns via SAP Enterprise Search
  • Multiple data export activities from SAP Enterprise Search reports
  • Authorization failures for S_RS_ADMWB objects

Network Indicators:

  • Large data transfers from SAP systems following search operations

SIEM Query:

source="sap_audit_log" AND (event="RS_ADMWB" OR auth_object="S_RS_ADMWB") AND result="SUCCESS" | stats count by user, table_name

🔗 References

📤 Share & Export