CVE-2025-42950

9.9 CRITICAL

📋 TL;DR

CVE-2025-42950 is a critical code injection vulnerability in SAP Landscape Transformation (SLT) that allows authenticated users to execute arbitrary ABAP code via RFC function modules. This effectively creates a backdoor that bypasses authorization checks, potentially leading to complete system compromise. Organizations running vulnerable SAP SLT systems with user accounts are affected.

💻 Affected Systems

Products:
  • SAP Landscape Transformation (SLT)
Versions: Specific versions not provided in references; consult SAP Note 3633838 for exact affected versions
Operating Systems: All operating systems running SAP SLT
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user-level access to the SAP system; RFC function modules must be accessible

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to steal sensitive data, modify business-critical information, disrupt operations, and establish persistent access across the SAP landscape.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive business data, configuration changes, and potential lateral movement within the SAP environment.

🟢

If Mitigated

Limited impact if proper network segmentation, strict user access controls, and monitoring are in place, though the vulnerability still presents significant risk.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user credentials but the vulnerability itself is straightforward to exploit once access is obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See SAP Note 3633838 for specific patch information

Vendor Advisory: https://me.sap.com/notes/3633838

Restart Required: Yes

Instructions:

1. Review SAP Note 3633838 for your specific SLT version. 2. Apply the security patch from SAP. 3. Restart the affected SAP systems. 4. Verify the patch is correctly applied.

🔧 Temporary Workarounds

Restrict RFC Access

all

Limit access to RFC function modules to only trusted systems and users

Use SAP transaction SM59 to review and restrict RFC destinations
Use transaction SMT1 to manage trusted RFC connections

Implement Authorization Controls

all

Strengthen authorization checks and implement additional security controls

Review and tighten authorization objects in transaction SU24
Implement additional security checks in custom code

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP SLT systems from untrusted networks
  • Enforce least privilege access controls and regularly audit user permissions

🔍 How to Verify

Check if Vulnerable:

Check if your SAP SLT version matches those listed in SAP Note 3633838 and verify if the security patch has been applied

Check Version:

Use SAP transaction SM51 or run report RSABAP_SOURCE_SCAN to check system details

Verify Fix Applied:

Verify the patch is applied by checking system status and confirming the fix version from SAP Note 3633838

📡 Detection & Monitoring

Log Indicators:

  • Unusual RFC calls to SLT function modules
  • Authorization failures followed by successful executions
  • ABAP code execution patterns in security audit logs

Network Indicators:

  • Unusual RFC traffic patterns to SLT systems
  • Suspicious connections to RFC ports (typically 33xx)

SIEM Query:

source="sap_audit_log" AND (event_type="RFC_CALL" OR event_type="AUTHORIZATION_CHECK") AND (resource="SLT_*" OR module="SLT*") AND result="SUCCESS"

🔗 References

📤 Share & Export