CVE-2025-42922

9.9 CRITICAL

📋 TL;DR

This critical vulnerability in SAP NetWeaver AS Java allows authenticated non-administrative users to upload arbitrary files that can be executed, leading to complete system compromise. Attackers can achieve remote code execution, data theft, and system takeover. All organizations running vulnerable SAP NetWeaver AS Java installations are affected.

💻 Affected Systems

Products:
  • SAP NetWeaver AS Java
Versions: Specific versions not detailed in provided references; consult SAP Note 3643865 for exact affected versions
Operating Systems: All operating systems supported by SAP NetWeaver AS Java
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access (non-administrative user), but default configurations typically include such users. The vulnerable service is available by default in affected versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to steal sensitive data, modify or delete critical information, disrupt business operations, and pivot to other systems in the network.

🟠

Likely Case

Attackers gain remote code execution with the privileges of the SAP Java application server, enabling data exfiltration, installation of backdoors, and lateral movement within the SAP landscape.

🟢

If Mitigated

With proper network segmentation, strict access controls, and monitoring, impact could be limited to the affected SAP system without allowing lateral movement to other critical assets.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. The CWE-94 (Improper Control of Generation of Code) suggests code injection is possible through file upload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3643865

Vendor Advisory: https://me.sap.com/notes/3643865

Restart Required: Yes

Instructions:

1. Download SAP Note 3643865 from the SAP Support Portal
2. Apply the security patch to all affected SAP NetWeaver AS Java systems
3. Restart the SAP Java application server
4. Verify the patch was successfully applied

🔧 Temporary Workarounds

Disable vulnerable service

all

Identify and disable the specific service allowing arbitrary file upload if not required for business operations

Consult SAP documentation for service-specific disablement procedures

Restrict user access

all

Implement strict access controls to limit which users can access the vulnerable service

Use SAP authorization concepts to restrict service access to minimal required users

🧯 If You Can't Patch

  • Implement network segmentation to isolate SAP systems from critical assets
  • Enhance monitoring for unusual file upload activities and unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if SAP Security Note 3643865 is applied using SAP Note Assistant or transaction SNOTE

Check Version:

Use SAP transaction SM51 or SM50 to check system details and applied notes

Verify Fix Applied:

Verify patch application through SAP Note Assistant and test that arbitrary file upload is no longer possible

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activities in SAP security audit logs
  • Unauthorized access attempts to vulnerable services
  • Suspicious process execution from uploaded files

Network Indicators:

  • Unexpected outbound connections from SAP systems
  • File upload traffic to SAP Java services

SIEM Query:

source="sap_audit_logs" AND (event="file_upload" OR service_access="vulnerable_service_name")

🔗 References

📤 Share & Export