Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SAP Patches Another Critical NetWeaver Vulnerability

Posted on May 13, 2025May 13, 2025 By CWS

Enterprise software program maker SAP on Tuesday launched 16 new and two up to date safety notes as a part of its Might 2025 Safety Patch Day. Two of the notes handle essential vulnerabilities in NetWeaver.

Probably the most extreme is an replace to a notice launched on April 24 to handle CVE-2025-31324 (CVSS rating of 10/10), a critical-severity bug in NetWeaver’s Visible Composer improvement server element that has been exploited within the wild since January, for distant code execution (RCE).

A whole lot of NetWeaver servers have been compromised via CVE-2025-31324’s exploitation, and software safety agency Onapsis warns that opportunistic attackers need to leverage webshells deployed in the course of the preliminary zero-day assaults.

The corporate is seeing “important exercise from attackers who’re utilizing public info to set off exploitation and abuse of webshells positioned by the unique attackers, who’ve presently gone darkish.”

Evaluation of the assaults has led to the invention of one other essential defect in NetWeaver’s Visible Composer. Tracked as CVE-2025-42999 (CVSS rating of 9.1) and described as an insecure deserialization challenge, the vulnerability was resolved with the second essential safety notice launched on SAP’s Might 2025 Safety Patch Day.

“SAP did a unbelievable job responding shortly to new info and circled a further patch to boost protections for the lively exploit within the wild,” Onapsis says.

Because the April 2025 safety notes had been rolled out, SAP additionally up to date two essential notes addressing code injection points in S/4HANA (CVE-2025-27429) and Panorama Transformation (CVE-2025-31330). Regardless of the completely different CVEs, the notes resolve the identical flaw.

On Tuesday, SAP launched 4 new and one up to date safety notes that handle high-severity bugs in Provider Relationship Administration, S/4HANA Cloud Non-public Version or On Premise, Enterprise Objects Enterprise Intelligence Platform, Panorama Transformation, and PDCE.Commercial. Scroll to proceed studying.

The software program maker additionally launched 11 new safety notes that resolve medium-severity vulnerabilities in varied merchandise.

SAP prospects are suggested to use the safety notes as quickly as potential, particularly given the continued exploitation of CVE-2025-31324.

Associated: Second Wave of Assaults Hitting SAP NetWeaver After Zero-Day Compromise

Associated: SAP Patches Important Code Injection Vulnerabilities

Associated: SAP Patches Excessive-Severity Vulnerabilities in Commerce, NetWeaver

Associated: SAP Releases 21 Safety Patches

Security Week News Tags:Critical, NetWeaver, Patches, SAP, Vulnerability

Post navigation

Previous Post: Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023
Next Post: Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments

Related Posts

Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors Security Week News
Google Researchers Find New Chrome Zero-Day Security Week News
DanaBot Botnet Disrupted, 16 Suspects Charged Security Week News
480,000 Catholic Health Patients Impacted by Serviceaide Data Leak Security Week News
Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War Security Week News
Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Identify and Block Malvertising
  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Identify and Block Malvertising
  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News