CVE-2025-42970

5.8 MEDIUM

📋 TL;DR

CVE-2025-42970 is a path traversal vulnerability in SAPCAR archive extraction tool that allows attackers to overwrite arbitrary files on a victim's system. High-privileged users extracting malicious SAPCAR archives are affected. This compromises system integrity and availability but not confidentiality.

💻 Affected Systems

Products:
  • SAPCAR
Versions: All versions prior to patch
Operating Systems: All platforms running SAPCAR
Default Config Vulnerable: ⚠️ Yes
Notes: Requires high-privileged user to extract malicious archive.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker overwrites critical system files, causing system compromise, service disruption, or permanent data loss.

🟠

Likely Case

Attacker overwrites application files to disrupt SAP operations or plant backdoors for persistence.

🟢

If Mitigated

Limited impact with proper access controls and monitoring in place.

🌐 Internet-Facing: LOW - Requires user interaction to extract malicious archive.
🏢 Internal Only: MEDIUM - Internal users with SAPCAR access could be targeted via phishing or compromised archives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires crafting malicious archive and social engineering to get victim to extract it.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3595156 for specific patched versions

Vendor Advisory: https://me.sap.com/notes/3595156

Restart Required: No

Instructions:

1. Review SAP Note 3595156. 2. Download latest SAPCAR version from SAP Support Portal. 3. Replace existing SAPCAR binary with patched version. 4. Verify installation.

🔧 Temporary Workarounds

Restrict SAPCAR Usage

all

Limit SAPCAR execution to trusted users and monitor usage.

Validate Archives Before Extraction

all

Scan SAPCAR archives for malicious content before extraction.

🧯 If You Can't Patch

  • Restrict SAPCAR execution to low-privileged accounts only
  • Implement strict monitoring of SAPCAR usage and file system changes

🔍 How to Verify

Check if Vulnerable:

Check SAPCAR version and compare against patched versions in SAP Note 3595156

Check Version:

sapcar -v (on Linux/Unix) or sapcar.exe -v (on Windows)

Verify Fix Applied:

Verify SAPCAR version matches patched version from SAP Note 3595156

📡 Detection & Monitoring

Log Indicators:

  • SAPCAR extraction logs showing unusual file paths
  • File system audit logs showing unexpected file writes outside extraction directory

Network Indicators:

  • Unusual archive downloads to SAP systems

SIEM Query:

Process: sapcar.exe AND File Write: ..\ or ../ patterns

🔗 References

📤 Share & Export