CVE-2025-42943

4.5 MEDIUM

📋 TL;DR

SAP GUI for Windows may leak NTLM hashes when specific ABAP frontend services are called with UNC paths. This requires an attacker with developer authorization in an ABAP Application Server to modify code, and a victim using SAP GUI for Windows to execute it. The vulnerability primarily affects organizations using SAP systems with Windows clients.

💻 Affected Systems

Products:
  • SAP GUI for Windows
Versions: Specific versions as detailed in SAP Note 3627845
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires both vulnerable SAP GUI client and attacker-controlled ABAP code execution environment.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could capture NTLM hashes, potentially enabling credential relay attacks or offline cracking to gain unauthorized access to Windows domain resources.

🟠

Likely Case

Internal attackers with developer privileges could exploit this to harvest NTLM hashes from targeted users, potentially escalating privileges within the Windows domain.

🟢

If Mitigated

With proper network segmentation, SMB signing enforcement, and developer access controls, the risk is significantly reduced to isolated credential exposure.

🌐 Internet-Facing: LOW - Exploitation requires internal access to SAP ABAP systems and user interaction with SAP GUI.
🏢 Internal Only: MEDIUM - Requires insider threat with developer privileges and user interaction, but could lead to domain compromise if successful.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires developer authorization in ABAP system to modify code, plus victim interaction with SAP GUI.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: As specified in SAP Note 3627845

Vendor Advisory: https://me.sap.com/notes/3627845

Restart Required: No

Instructions:

1. Review SAP Note 3627845 for specific patch details. 2. Apply the recommended SAP GUI for Windows update. 3. Verify patch application through version checking.

🔧 Temporary Workarounds

Restrict UNC Path Access

Windows

Configure Windows clients to restrict UNC path access from SAP GUI processes

Configure Windows Firewall to block outbound SMB (ports 139/445) from SAP GUI processes
Use Group Policy to restrict UNC path access

Enforce SMB Signing

Windows

Require SMB packet signing to prevent NTLM relay attacks

Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options > Microsoft network server: Digitally sign communications (always)

🧯 If You Can't Patch

  • Implement strict developer access controls and code review processes for ABAP systems
  • Monitor for suspicious UNC path requests from SAP GUI processes in network logs

🔍 How to Verify

Check if Vulnerable:

Check SAP GUI version against affected versions in SAP Note 3627845

Check Version:

In SAP GUI: Help → About SAP Logon

Verify Fix Applied:

Confirm SAP GUI version is updated to patched version specified in SAP Note 3627845

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing SMB authentication attempts from SAP GUI processes
  • SAP system logs showing ABAP code modifications

Network Indicators:

  • SMB traffic (ports 139/445) originating from SAP GUI processes to unexpected destinations
  • UNC path requests in network captures

SIEM Query:

source="windows" AND event_id=4624 AND process_name="saplogon.exe" AND destination_port IN (139, 445)

🔗 References

📤 Share & Export