CVE-2025-42991

4.3 MEDIUM

📋 TL;DR

SAP S/4HANA Bank Account Application has an authorization vulnerability where authenticated 'approver' users can delete attachments from other users' bank account applications. This affects organizations using SAP S/4HANA with the Bank Account Application module. The vulnerability allows unauthorized data modification but doesn't compromise confidentiality or availability.

💻 Affected Systems

Products:
  • SAP S/4HANA Bank Account Application
Versions: Specific versions not provided in CVE; check SAP Note 3608058 for details
Operating Systems: Any OS running SAP S/4HANA
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Bank Account Application module enabled and approver roles configured.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious approver systematically deletes critical financial documentation from multiple bank accounts, causing operational disruption and potential compliance violations.

🟠

Likely Case

Accidental or intentional deletion of bank account attachments by approvers who shouldn't have that permission, requiring manual restoration and audit trail correction.

🟢

If Mitigated

Minimal impact with proper segregation of duties and audit logging in place to detect and reverse unauthorized deletions.

🌐 Internet-Facing: LOW - This requires authenticated access to the SAP application, which is typically not directly internet-facing.
🏢 Internal Only: MEDIUM - Internal users with approver roles can exploit this, but impact is limited to data integrity within the bank account module.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated approver access and knowledge of other users' bank account applications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See SAP Note 3608058 for specific patch information

Vendor Advisory: https://me.sap.com/notes/3608058

Restart Required: Yes

Instructions:

1. Review SAP Note 3608058 for patch details. 2. Apply the SAP security patch via SAP Solution Manager or manual transport. 3. Restart affected SAP services. 4. Verify authorization checks are now enforced.

🔧 Temporary Workarounds

Temporary Role Restriction

all

Temporarily remove delete attachment permissions from approver roles until patch is applied.

Use SAP transaction PFCG to modify approver role authorizations

🧯 If You Can't Patch

  • Implement strict segregation of duties and limit approver access to only necessary users.
  • Enable detailed audit logging for all attachment deletion activities and implement regular review processes.

🔍 How to Verify

Check if Vulnerable:

Test if approver users can delete attachments from bank account applications belonging to other users.

Check Version:

Check SAP system version via transaction SM51 or SMICM

Verify Fix Applied:

After patching, verify approver users can only delete attachments from their authorized bank accounts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual attachment deletion patterns in SAP audit logs
  • Multiple attachment deletions by single approver across different accounts

Network Indicators:

  • HTTP POST requests to attachment deletion endpoints with unauthorized account parameters

SIEM Query:

source="sap_audit_log" AND event="attachment_delete" AND user_role="approver" AND account_owner!=user

🔗 References

📤 Share & Export