CVE-2025-42910

9.0 CRITICAL

📋 TL;DR

This vulnerability allows authenticated attackers to upload arbitrary files, including malicious executables, to SAP Supplier Relationship Management systems. Successful exploitation could lead to malware execution, compromising confidentiality, integrity, and availability. Organizations using vulnerable SAP SRM versions are affected.

💻 Affected Systems

Products:
  • SAP Supplier Relationship Management
Versions: Specific versions not provided in CVE; check SAP Note 3647332 for details
Operating Systems: Any OS running SAP SRM
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access; all default configurations with vulnerable versions are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers upload and execute malware, gaining complete system control, stealing sensitive data, disrupting operations, and potentially moving laterally through the network.

🟠

Likely Case

Attackers upload malware that gets executed by legitimate users, leading to data theft, ransomware deployment, or backdoor installation.

🟢

If Mitigated

With proper file validation and user education, malicious uploads are blocked, and users avoid executing suspicious files, limiting impact to unsuccessful upload attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3647332 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3647332

Restart Required: Yes

Instructions:

1. Review SAP Note 3647332 for patch details. 2. Apply the SAP security patch via standard SAP update procedures. 3. Restart the SAP SRM system as required.

🔧 Temporary Workarounds

Implement File Upload Restrictions

all

Configure SAP SRM to restrict file uploads to specific, safe file types and validate file content.

Enhance User Awareness

all

Train users to avoid downloading and executing files from untrusted sources within the application.

🧯 If You Can't Patch

  • Implement network segmentation to isolate SAP SRM systems from critical assets.
  • Deploy endpoint detection and response (EDR) tools to monitor for malicious file execution.

🔍 How to Verify

Check if Vulnerable:

Check SAP SRM version against the vulnerable versions listed in SAP Note 3647332.

Check Version:

Use SAP transaction code SM51 or check system info in SAP GUI.

Verify Fix Applied:

Verify that the patch from SAP Note 3647332 has been applied and test file upload functionality with malicious files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads, especially executable files, in SAP application logs.

Network Indicators:

  • Unexpected outbound connections from SAP SRM servers post-file upload.

SIEM Query:

source="sap_srm" AND (event="file_upload" AND file_extension IN ("exe", "bat", "ps1"))

🔗 References

📤 Share & Export