CVE-2025-42918

4.3 MEDIUM

📋 TL;DR

This vulnerability in SAP NetWeaver Application Server for ABAP allows authenticated users with background processing access to read profile parameters they shouldn't have access to. It affects confidentiality but doesn't impact integrity or availability. Only users with specific background processing privileges are affected.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server for ABAP
Versions: Specific versions not detailed in CVE; check SAP Note 3623504 for exact affected versions
Operating Systems: All platforms running affected SAP NetWeaver versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where users have background processing authorization (S_BTCH_ADM, S_BTCH_JOB, or similar)

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could read sensitive profile parameters containing configuration secrets, connection strings, or system information that could aid further attacks.

🟠

Likely Case

Authorized users accidentally or intentionally accessing profile parameters beyond their intended scope, potentially exposing non-critical configuration details.

🟢

If Mitigated

Minimal impact as proper access controls and monitoring would detect and prevent unauthorized parameter access attempts.

🌐 Internet-Facing: LOW - Requires authenticated access with specific background processing privileges, making internet exploitation unlikely.
🏢 Internal Only: MEDIUM - Internal users with background processing access could exploit this to gather system information for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access with specific background processing privileges; exploitation involves using background processing functions to access profile parameters

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3623504

Vendor Advisory: https://me.sap.com/notes/3623504

Restart Required: No

Instructions:

1. Download SAP Note 3623504 from SAP Support Portal. 2. Apply the note using SAP Note Assistant or transaction SNOTE. 3. Verify the correction is active in the system.

🔧 Temporary Workarounds

Restrict Background Processing Access

all

Review and restrict S_BTCH_ADM and S_BTCH_JOB authorizations to only necessary users

Use transaction SUIM to analyze background processing authorizations
Use transaction PFCG to modify role assignments

🧯 If You Can't Patch

  • Implement strict access controls on background processing authorizations
  • Monitor profile parameter access logs for unusual activity

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3623504 is applied using transaction SNOTE or check system status in SAP Support Portal

Check Version:

Use transaction SM51 to check system information or check SAP_BASIS version

Verify Fix Applied:

Verify SAP Note 3623504 is active and test that users with background processing access cannot read unauthorized profile parameters

📡 Detection & Monitoring

Log Indicators:

  • Unusual profile parameter access via background processing transactions
  • Multiple failed authorization checks for profile parameters

Network Indicators:

  • Not applicable - local authorization bypass

SIEM Query:

Search for transaction codes related to background processing (SM36, SM37) combined with profile parameter access attempts

🔗 References

📤 Share & Export