CVE-2025-42946

6.9 MEDIUM

📋 TL;DR

This directory traversal vulnerability in SAP S/4HANA Bank Communication Management allows authenticated attackers with high privileges to access sensitive operating system files. Attackers could read or delete critical files, compromising confidentiality with minimal impact on system availability. Only organizations using vulnerable SAP S/4HANA versions with Bank Communication Management are affected.

💻 Affected Systems

Products:
  • SAP S/4HANA
Versions: Specific versions mentioned in SAP Note 3614804
Operating Systems: All supported SAP S/4HANA operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Bank Communication Management component and high-privilege access to specific transaction/method

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate sensitive system files, configuration data, or credentials, potentially leading to further system compromise or data breaches.

🟠

Likely Case

Privileged insiders or compromised accounts could access sensitive operating system files, exposing confidential information without disrupting business operations.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires high privileges and knowledge of specific Bank Communication Management transaction/method

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3614804

Vendor Advisory: https://me.sap.com/notes/3614804

Restart Required: No

Instructions:

1. Download SAP Note 3614804 from SAP Support Portal. 2. Apply the security patch following SAP's standard patching procedures. 3. Verify the patch is correctly applied.

🔧 Temporary Workarounds

Restrict Transaction Access

SAP

Limit access to the specific Bank Communication Management transaction and method mentioned in the vulnerability

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access Bank Communication Management transactions
  • Enable detailed logging and monitoring for file access attempts through Bank Communication Management

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3614804 is applied in your SAP system using transaction SNOTE

Check Version:

Use SAP transaction SM51 to check system details and applied notes

Verify Fix Applied:

Verify SAP Note 3614804 is marked as successfully implemented in transaction SNOTE

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns through Bank Communication Management transactions
  • Multiple failed directory traversal attempts

Network Indicators:

  • Unusual data transfers from SAP system following Bank Communication Management access

SIEM Query:

source="sap_audit_log" AND (transaction="BCM_*" OR method="vulnerable_method") AND (action="file_access" OR result="success")

🔗 References

📤 Share & Export