CVE-2025-42935

4.1 MEDIUM

📋 TL;DR

CVE-2025-42935 allows authorized administrators with local file system access to read sensitive information from SAP NetWeaver ICM log files. This vulnerability affects SAP NetWeaver Application Server ABAP and ABAP Platform systems with ICM enabled. Only users with administrative privileges and local file access can exploit this information disclosure.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server ABAP
  • SAP ABAP Platform
Versions: Multiple versions - see SAP Note 3601480 for specific affected versions
Operating Systems: All supported SAP operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Internet Communication Manager (ICM) to be enabled and configured with logging. Only affects systems where administrators have local file system access to log directories.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrators with malicious intent could extract sensitive configuration data, credentials, or business information from ICM logs, potentially enabling further attacks or data exfiltration.

🟠

Likely Case

Accidental exposure of sensitive log data to authorized administrators during routine maintenance or troubleshooting activities.

🟢

If Mitigated

With proper access controls and log sanitization, the risk is limited to authorized administrators who already have significant system access.

🌐 Internet-Facing: LOW - Exploitation requires local file system access and administrative privileges, not directly accessible from the internet.
🏢 Internal Only: MEDIUM - Internal administrators with local access could exploit this, but they already have significant system privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrative privileges and local file system access to ICM log directories. No authentication bypass is involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3601480

Vendor Advisory: https://me.sap.com/notes/3601480

Restart Required: No

Instructions:

1. Download SAP Note 3601480 from SAP Support Portal. 2. Apply the note using SAP Note Assistant or manual implementation. 3. Verify the fix by checking that sensitive information is no longer logged in ICM files.

🔧 Temporary Workarounds

Restrict ICM Log File Access

Unix/Linux

Limit file system permissions to ICM log directories to prevent unauthorized access

chmod 600 /usr/sap/<SID>/<instance>/work/icm*
chown <sapadm>:sapsys /usr/sap/<SID>/<instance>/work/icm*

Disable Detailed ICM Logging

all

Reduce ICM logging verbosity to minimize sensitive information exposure

icm/HTTP/logging_0 = 0
icm/HTTPS/logging_0 = 0

🧯 If You Can't Patch

  • Implement strict access controls on ICM log directories using OS-level permissions
  • Regularly monitor and audit access to ICM log files and review log content for sensitive data

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3601480 is applied using transaction SNOTE or check ICM log files for sensitive information like credentials or configuration details.

Check Version:

Execute 'disp+work' in SAP GUI or check system information in transaction SM51

Verify Fix Applied:

Verify SAP Note 3601480 implementation status and test that sensitive information is no longer present in ICM log files after applying the fix.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to ICM log directories
  • Administrative users accessing ICM log files outside normal maintenance windows

Network Indicators:

  • No network-based indicators as this is a local file system vulnerability

SIEM Query:

source="OS Audit Logs" AND (event_type="file_access" AND file_path="*icm*log*" AND user="*adm*")

🔗 References

📤 Share & Export