Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login

New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login

Posted on October 15, 2025October 15, 2025 By CWS

Oct 15, 2025Ravie Lakshmanan Enterprise Software program / Vulnerability
SAP has rolled out safety fixes for 13 new safety points, together with further hardening for a maximum-severity bug in SAP NetWeaver AS Java that would lead to arbitrary command execution.
The vulnerability, tracked as CVE-2025-42944, carries a CVSS rating of 10.0. It has been described as a case of insecure deserialization.
“As a consequence of a deserialization vulnerability in SAP NetWeaver, an unauthenticated attacker might exploit the system via the RMI-P4 module by submitting a malicious payload to an open port,” based on an outline of the flag in CVE.org.

“The deserialization of such untrusted Java objects might result in arbitrary OS command execution, posing a excessive influence to the appliance’s confidentiality, integrity, and availability.”
Whereas the vulnerability was first addressed by SAP final month, safety firm Onapsis stated the newest repair offers additional safeguards to safe in opposition to the chance posed by deserialization.
“The extra layer of safety relies on implementing a JVM-wide filter (jdk.serialFilter) that forestalls devoted courses from being deserialized,” it famous. “The listing of advisable courses and packages to dam was outlined in collaboration with the ORL and is split into a compulsory part and an non-compulsory part.”
One other essential vulnerability of word is CVE-2025-42937 (CVSS rating: 9.8), a listing traversal flaw in SAP Print Service that arises on account of inadequate path validation, permitting an unauthenticated attacker to succeed in the mum or dad listing and overwrite system information.
The third essential flaw patched by SAP considerations an unrestricted file add bug in SAP Provider Relationship Administration (CVE-2025-42910, CVSS rating: 9.0) that would allow an attacker to add arbitrary information, together with malicious executables that would influence the confidentiality, integrity, and availability of the appliance.

Whereas there isn’t any proof of those flaws being exploited within the wild, it is important that customers apply the newest patches and mitigations as quickly as doable to keep away from potential threats.
“Deserialization stays the main danger,” Pathlock’s Jonathan Stross stated. “The P4/RMI chain continues to drive essential publicity in AS Java, with SAP issuing each a direct repair and a hardened JVM configuration to scale back gadget‑class abuse.”

The Hacker News Tags:Attackers, Bug, Lets, Login, NetWeaver, SAP, Servers

Post navigation

Previous Post: Adobe Patches Critical Vulnerability in Connect Collaboration Suite
Next Post: Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code

Related Posts

MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks The Hacker News
PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads The Hacker News
Policy, Isolation, and Data Controls That Actually Work Policy, Isolation, and Data Controls That Actually Work The Hacker News
SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day The Hacker News
Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data The Hacker News
Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark