CVE-2025-42949

4.9 MEDIUM

📋 TL;DR

This CVE describes an authorization bypass vulnerability in SAP ABAP Platform where authenticated users with elevated privileges can use the SQL Console to access database tables without proper authorization. This compromises data confidentiality but doesn't affect system integrity or availability. Only SAP systems with ABAP Platform are affected.

💻 Affected Systems

Products:
  • SAP ABAP Platform
Versions: Specific versions not provided in CVE description; check SAP Note 3626722 for details
Operating Systems: Any OS running SAP ABAP Platform
Default Config Vulnerable: ⚠️ Yes
Notes: Requires ABAP Platform with SQL Console functionality and users with elevated privileges but insufficient authorization checks.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged authenticated users could access sensitive business data, customer information, financial records, or intellectual property stored in database tables they shouldn't have access to.

🟠

Likely Case

Internal users with elevated privileges (but not full authorization) could access restricted data for unauthorized purposes, potentially violating data privacy regulations.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized access attempts would be detected and prevented, limiting exposure to authorized data only.

🌐 Internet-Facing: LOW - Exploitation requires authenticated access with elevated privileges, making direct internet exploitation unlikely without prior compromise.
🏢 Internal Only: HIGH - Internal users with elevated privileges could exploit this vulnerability to access sensitive data they're not authorized to view.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access with elevated privileges and knowledge of SQL Console usage. No public exploit code is mentioned.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3626722 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3626722

Restart Required: No

Instructions:

1. Review SAP Note 3626722 for specific patch details. 2. Apply the relevant SAP Security Patch. 3. Verify authorization checks are properly implemented for SQL Console transactions.

🔧 Temporary Workarounds

Restrict SQL Console Access

all

Limit access to SQL Console transactions to only authorized users who absolutely need it.

Use SAP transaction SU24 to adjust authorization objects for SQL Console transactions
Use PFCG to restrict role assignments

Implement Additional Monitoring

all

Monitor SQL Console usage and database access patterns for unauthorized activity.

Configure SAP Security Audit Log for SQL Console transactions
Set up alerts for unusual database access patterns

🧯 If You Can't Patch

  • Implement strict role-based access control (RBAC) to limit who has elevated privileges
  • Enable comprehensive logging and monitoring of SQL Console usage and database access

🔍 How to Verify

Check if Vulnerable:

Check if your SAP system has the vulnerable authorization configuration by reviewing authorization objects for SQL Console transactions.

Check Version:

Use SAP transaction SM51 to check system details or review SAP Note implementation status

Verify Fix Applied:

Verify patch installation via SAP Note 3626722 implementation and test authorization checks for SQL Console access.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL Console transaction usage
  • Database table access from unauthorized users
  • Failed authorization checks for SQL Console

Network Indicators:

  • Not applicable - this is an application-layer vulnerability

SIEM Query:

Search for SAP audit logs containing SQL Console transactions (ST03N, STAD) from users without proper authorization

🔗 References

📤 Share & Export