Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover

Posted on July 8, 2025July 8, 2025 By CWS

Enterprise software program maker SAP on Tuesday introduced the discharge of 27 new and 4 up to date safety notes as a part of its July 2025 Safety Patch Day, together with six that deal with essential vulnerabilities.

On the high of the record is an replace for a observe launched in Could, which addresses 5 safety defects in its Provider Relationship Administration (SRM).

SAP initially marked the observe as high-priority, primarily based on the severity rating of crucial of those bugs. Now, it has up to date the ranking to ‘essential’, upon studying that the influence of certainly one of these points is far greater than initially decided.

The CVSS rating for the bug, tracked as CVE-2025-30012, has been up to date from 3.9 to 10/10, after it was decided that it might be abused by unauthenticated attackers to execute arbitrary OS instructions with administrative privileges.

The difficulty exists as a result of the Stay Public sale Cockpit part of SRM makes use of a deprecated java applet that will decode crafted malicious requests, ensuing within the insecure deserialization of knowledge and command execution.

The second observe in SAP’s July 2025 Safety Patch Day advisory addresses CVE-2025-42967 (CVSS rating of 9.9), a distant code execution vulnerability in S/4HANA and SCM.

An attacker with consumer stage privileges can exploit the flaw to create a brand new report containing their very own code, which may permit them to take full management of a weak SAP system.

SAP’s contemporary spherical of safety notes additionally resolves 4 critical-severity insecure deserialization flaws in varied elements of NetWeaver. Commercial. Scroll to proceed studying.

The problems, tracked as CVE-2025-42963, CVE-2025-42964, CVE-2025-42966, and CVE-2025-42980 (CVSS rating of 9.1), might be exploited by attackers with excessive privileges to compromise the applying and system, or take full management of the host system, safety agency Onapsis explains.

4 high-severity points in NetWeaver, Enterprise Objects, and Enterprise Warehouse have been additionally patched this week, and a high-priority observe launched final month to deal with a listing traversal in NetWeaver’s Visible Composer part was up to date.

SAP customers are suggested to replace their deployments as quickly as doable. Though the software program maker makes no point out of any of those vulnerabilities being exploited within the wild, menace actors are recognized to have focused SAP flaws to compromise enterprise environments.

Associated: Crucial Vulnerability Patched in SAP NetWeaver

Associated: SAP Patches One other Exploited NetWeaver Vulnerability

Associated: SAP Zero-Day Probably Exploited by Preliminary Entry Dealer

Associated: SAP Patches Crucial Code Injection Vulnerabilities

Security Week News Tags:Code, Critical, Execution, Flaws, Full, Patches, Remote, SAP, System, Takeover

Post navigation

Previous Post: Exploits, Technical Details Released for CitrixBleed2 Vulnerability
Next Post: Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension

Related Posts

US Insurance Industry Warned of Scattered Spider Attacks Security Week News
Kelly Benefits Data Breach Impacts 550,000 People Security Week News
Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks Security Week News
Maze Banks $25M to Tackle Cloud Security with AI Agents Security Week News
Canadian Electric Utility Lists Customer Information Stolen by Hackers Security Week News
British Man Suspected of Being the Hacker IntelBroker Arrested, Charged Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Implement Role-Based Access Control (RBAC)
  • Adobe Patches Critical Code Execution Bugs
  • Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday
  • Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials
  • Microsoft Releases Cumulative Update for Windows 10 With July Patch Tuesday 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Implement Role-Based Access Control (RBAC)
  • Adobe Patches Critical Code Execution Bugs
  • Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday
  • Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials
  • Microsoft Releases Cumulative Update for Windows 10 With July Patch Tuesday 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News