CVE-2025-42957

9.9 CRITICAL

📋 TL;DR

This critical vulnerability in SAP S/4HANA allows authenticated users to inject arbitrary ABAP code via RFC-exposed function modules, bypassing authorization checks. This effectively creates a backdoor that can lead to complete system compromise. All SAP S/4HANA systems with the vulnerable component are affected.

💻 Affected Systems

Products:
  • SAP S/4HANA
Versions: Specific versions not detailed in provided references; consult SAP Note 3627998 for exact affected versions
Operating Systems: All supported OS for SAP S/4HANA
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user privileges; vulnerability exists in RFC-exposed function modules

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary ABAP code, access/modify all data, create persistent backdoors, and disrupt business operations.

🟠

Likely Case

Privilege escalation leading to unauthorized data access, configuration changes, and potential lateral movement within the SAP landscape.

🟢

If Mitigated

Limited impact if proper network segmentation, strict user access controls, and monitoring are in place, but risk remains significant.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access; ABAP code injection via RFC is well-understood attack vector

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to SAP Note 3627998 for specific patch details

Vendor Advisory: https://me.sap.com/notes/3627998

Restart Required: Yes

Instructions:

1. Access SAP Support Portal
2. Download and apply security patch from SAP Note 3627998
3. Apply SAP Security Patch Day updates
4. Restart affected SAP systems

🔧 Temporary Workarounds

Restrict RFC Access

all

Limit RFC connections to trusted systems only and disable unnecessary RFC function modules

Use transaction SM59 to review and restrict RFC destinations
Use transaction SE37 to deactivate vulnerable function modules

Enhance User Authorization

all

Implement strict authorization checks and principle of least privilege for all users

Review and tighten authorization profiles via transaction PFCG
Implement SAP GRC Access Control

🧯 If You Can't Patch

  • Implement network segmentation to isolate SAP systems from untrusted networks
  • Enable detailed logging and monitoring of RFC transactions and ABAP code execution

🔍 How to Verify

Check if Vulnerable:

Check if your SAP S/4HANA version matches affected versions listed in SAP Note 3627998

Check Version:

Execute transaction SM51 to check SAP kernel and system version

Verify Fix Applied:

Verify patch application via SAP Note 3627998 implementation and test that ABAP code injection via RFC is no longer possible

📡 Detection & Monitoring

Log Indicators:

  • Unusual RFC connections
  • ABAP code execution patterns in system logs
  • Authorization failures for function modules

Network Indicators:

  • Unexpected RFC traffic patterns
  • Connections to SAP system from unauthorized sources

SIEM Query:

Search for event IDs related to RFC function module execution and ABAP code injection attempts

🔗 References

📤 Share & Export