CVE-2025-42977

7.6 HIGH

📋 TL;DR

SAP NetWeaver Visual Composer has a directory traversal vulnerability where high-privileged users can manipulate input paths to access arbitrary files. This allows attackers to read sensitive files or modify system files, affecting organizations using vulnerable SAP NetWeaver installations.

💻 Affected Systems

Products:
  • SAP NetWeaver Visual Composer
Versions: Specific versions not detailed in CVE; refer to SAP Note 3610591 for affected versions
Operating Systems: All platforms running SAP NetWeaver
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires high-privileged user access; default SAP configurations with standard user roles may be vulnerable if privileged accounts are compromised.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via reading sensitive configuration files, credentials, or modifying critical system files leading to service disruption.

🟠

Likely Case

Unauthorized access to sensitive business data, configuration files, or user information stored on the SAP server.

🟢

If Mitigated

Limited impact if proper access controls, network segmentation, and monitoring are implemented to detect path traversal attempts.

🌐 Internet-Facing: MEDIUM - While exploitation requires high-privileged access, internet-facing SAP systems increase attack surface and potential for credential compromise.
🏢 Internal Only: HIGH - Internal attackers with legitimate high-privileged access can exploit this vulnerability to escalate privileges and access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires high-privileged user credentials; once obtained, path traversal is straightforward. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to SAP Note 3610591 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3610591

Restart Required: Yes

Instructions:

1. Review SAP Note 3610591 for specific patch details. 2. Apply the SAP Security Patch Day updates for your NetWeaver version. 3. Restart affected SAP services. 4. Verify patch application through version checks.

🔧 Temporary Workarounds

Restrict High-Privileged Access

all

Implement strict access controls and least privilege principles for high-privileged SAP accounts

Input Validation Enhancement

all

Implement additional input validation for path parameters in custom code

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP systems from sensitive data stores
  • Enhance monitoring and alerting for unusual file access patterns by high-privileged users

🔍 How to Verify

Check if Vulnerable:

Check SAP system version against affected versions listed in SAP Note 3610591

Check Version:

Transaction code SM51 or SM50 to check SAP kernel and component versions

Verify Fix Applied:

Verify patch application through SAP transaction SPAM/SAINT and confirm version is updated beyond vulnerable range

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in SAP security audit logs
  • Multiple failed path traversal attempts in application logs

Network Indicators:

  • Unusual outbound file transfers from SAP servers
  • Suspicious HTTP requests with directory traversal patterns

SIEM Query:

source="sap_audit_logs" AND (event_type="file_access" AND path="../") OR (user_privilege="HIGH" AND operation="file_read")

🔗 References

📤 Share & Export