CVE-2025-42933

8.8 HIGH

📋 TL;DR

This vulnerability in SAP Business One allows attackers to intercept unencrypted credentials when users log in via the native client. The SLD backend service fails to properly encrypt certain APIs, exposing sensitive authentication data in HTTP responses. Organizations using affected SAP Business One versions are at risk.

💻 Affected Systems

Products:
  • SAP Business One
Versions: Specific versions not detailed in CVE; check SAP Note 3642961 for exact affected versions
Operating Systems: Windows, Linux (if SAP Business One is deployed on Linux)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects SAP Business One deployments using the native client with SLD backend service. Cloud deployments may have different exposure.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials, leading to complete system compromise, data theft, and potential ransomware deployment across the SAP environment.

🟠

Likely Case

Credential harvesting leading to unauthorized access to business data, financial information, and potential privilege escalation within the SAP system.

🟢

If Mitigated

Limited exposure if network segmentation isolates SAP systems and strong authentication controls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept unencrypted traffic. The vulnerability is in the API encryption implementation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3642961 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3642961

Restart Required: Yes

Instructions:

1. Review SAP Note 3642961 for affected versions and patches. 2. Apply the relevant SAP Security Patch Day updates. 3. Restart SAP Business One services. 4. Verify encryption is properly enforced.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate SAP Business One systems from untrusted networks to prevent credential interception.

Force HTTPS/TLS

all

Configure all SAP Business One communications to use encrypted HTTPS/TLS connections only.

🧯 If You Can't Patch

  • Implement network monitoring to detect credential interception attempts
  • Enforce multi-factor authentication for all SAP Business One users

🔍 How to Verify

Check if Vulnerable:

Check if SAP Business One version matches affected versions in SAP Note 3642961. Monitor network traffic for unencrypted credential transmission.

Check Version:

Check SAP Business One version through administration tools or consult system documentation.

Verify Fix Applied:

Verify patch installation via SAP management console and test that credentials are no longer exposed in HTTP responses.

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts from unusual locations
  • Multiple authentication requests from single IP

Network Indicators:

  • Unencrypted HTTP traffic containing credential data to/from SAP Business One systems

SIEM Query:

Search for HTTP traffic to SAP Business One ports containing 'password', 'user', or authentication tokens in plaintext.

🔗 References

📤 Share & Export