CVE-2025-43002

4.3 MEDIUM

📋 TL;DR

This vulnerability in SAP S4CORE allows authenticated attackers to access restricted information through OData meta-data properties due to missing authorization checks. It affects SAP S4CORE systems with exposed OData services, potentially exposing sensitive data to authorized users who shouldn't have access.

💻 Affected Systems

Products:
  • SAP S4CORE
Versions: Specific versions not provided in CVE; check SAP Note 3227940 for details
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires OData services to be enabled and accessible; affects authenticated users only

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attackers could access sensitive business data, customer information, or configuration details they shouldn't have permission to view, potentially leading to data breaches or competitive intelligence gathering.

🟠

Likely Case

Internal users with legitimate access to some OData services could discover and access additional restricted endpoints or data they're not authorized to view, violating least privilege principles.

🟢

If Mitigated

With proper network segmentation, access controls, and monitoring, the impact is limited to authorized users within controlled environments accessing only the specific data they discover.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of OData endpoints; attackers need to discover and access restricted meta-data properties

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3227940 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3227940

Restart Required: Yes

Instructions:

1. Review SAP Note 3227940 for your specific SAP S4CORE version
2. Apply the security patch from SAP Support Portal
3. Restart affected SAP services
4. Verify authorization checks are now enforced

🔧 Temporary Workarounds

Restrict OData Service Access

all

Limit access to OData services to only necessary users and roles

Use SAP transaction SICF to restrict service access
Apply authorization objects to OData services

Network Segmentation

all

Isolate SAP systems and restrict access to OData endpoints

Configure firewall rules to limit access to SAP ports
Implement network segmentation between user zones and SAP systems

🧯 If You Can't Patch

  • Implement strict role-based access controls (RBAC) for all OData services
  • Enable detailed logging and monitoring of OData meta-data access attempts

🔍 How to Verify

Check if Vulnerable:

Test authenticated access to OData meta-data endpoints that should be restricted; if accessible without proper authorization, system is vulnerable

Check Version:

Check SAP system version via transaction SM51 or system info

Verify Fix Applied:

After patching, verify that previously accessible restricted OData meta-data endpoints now require proper authorization

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to OData meta-data endpoints
  • Multiple failed authorization attempts followed by successful access
  • Access to OData services from unexpected user roles

Network Indicators:

  • Increased traffic to /sap/opu/odata/sap/ endpoints
  • Requests to OData $metadata endpoints from unauthorized sources

SIEM Query:

source="sap_audit_log" AND (event="authorization_failure" OR event="odata_access") AND resource="metadata" | stats count by user, resource

🔗 References

📤 Share & Export