CVE-2025-42911

5.0 MEDIUM

📋 TL;DR

CVE-2025-42911 is an information disclosure vulnerability in SAP NetWeaver's Service Data Download component. Authenticated users can call a remote-enabled function module to access sensitive system information about the SAP environment and underlying operating system. This affects organizations running vulnerable SAP NetWeaver installations.

💻 Affected Systems

Products:
  • SAP NetWeaver
Versions: Specific versions not detailed in CVE; refer to SAP Note 3627644 for exact affected versions
Operating Systems: All operating systems supported by SAP NetWeaver
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the SAP system; vulnerability exists in Service Data Download component

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gather detailed system information including SAP configuration details, operating system details, and potentially other sensitive data that could facilitate further attacks.

🟠

Likely Case

Authenticated users (including legitimate users with malicious intent) accessing system information they shouldn't have access to, potentially enabling reconnaissance for more serious attacks.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to minimal information leakage that doesn't directly compromise system integrity.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to the SAP system and knowledge of the vulnerable function module

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3627644

Vendor Advisory: https://me.sap.com/notes/3627644

Restart Required: No

Instructions:

1. Download SAP Note 3627644 from SAP Support Portal. 2. Apply the correction instructions provided in the note. 3. Verify the fix by testing the vulnerable function module.

🔧 Temporary Workarounds

Restrict Function Module Access

SAP

Use SAP authorization objects to restrict access to the vulnerable remote-enabled function module

Use transaction SE93 to check function module authorization
Use transaction SU24 to maintain authorization objects

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can execute remote-enabled function modules
  • Monitor and audit usage of function modules in the Service Data Download component

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3627644 is applied in your system using transaction SNOTE

Check Version:

Use transaction SM51 to check SAP system version and applied notes

Verify Fix Applied:

After applying the note, attempt to execute the vulnerable function module to confirm access is properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to function modules in Service Data Download
  • Multiple failed authorization checks for specific function modules

Network Indicators:

  • Unusual RFC calls to the vulnerable function module

SIEM Query:

source="SAP" AND (event_type="authorization_failure" OR event_type="function_module_call") AND module_name="*Service Data Download*"

🔗 References

📤 Share & Export