Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution

Posted on August 19, 2025August 19, 2025 By CWS

Aug 19, 2025Ravie LakshmananVulnerability / Cyber Espionage
A brand new exploit combining two crucial, now-patched safety flaws in SAP NetWeaver has emerged within the wild, placing organizations susceptible to system compromise and information theft.
The exploit in query chains collectively CVE-2025-31324 and CVE-2025-42999 to bypass authentication and obtain distant code execution, SAP safety firm Onapsis mentioned.

CVE-2025-31324 (CVSS rating: 10.0) – Lacking Authorization examine in SAP NetWeaver’s Visible Composer growth server
CVE-2025-42999 (CVSS rating: 9.1) – Insecure Deserialization in SAP NetWeaver’s Visible Composer growth server

The vulnerabilities had been addressed by SAP again in April and Could 2025, however not earlier than they had been abused by menace actors as zero-days since a minimum of March.

A number of ransomware and information extortion teams, together with Qilin, BianLian, and RansomExx, have been noticed weaponizing the issues, to not point out a number of China-nexus espionage crews who’ve additionally put them to make use of in assaults focusing on crucial infrastructure networks.
The existence of the exploit was first reported final week by vx-underground, which mentioned it was launched by Scattered Lapsus$ Hunters, a brand new fluid alliance shaped by Scattered Spider and ShinyHunters.
“These vulnerabilities enable an unauthenticated attacker to execute arbitrary instructions on the goal SAP System, together with the add of arbitrary recordsdata,” Onapsis mentioned. “This will result in distant code execution (RCE) and a whole takeover of the affected system and SAP enterprise information and processes.”
The exploit, the corporate added, can not solely be used to deploy internet shells, but additionally be weaponized to conduct living-off-the-land (LotL) assaults by instantly executing working system instructions with out having to drop extra artifacts on the compromised system. These instructions are run with SAP administrator privileges, granting unhealthy actors unauthorized entry to SAP information and system sources.

Particularly, the assault chain first makes use of CVE-2025-31324 to sidestep authentication and add the malicious payload to the server. The deserialization vulnerability (CVE-2025-42999) is then exploited to unpack the payload and execute it with elevated permissions.
“The publication of this deserialization gadget is especially regarding because of the truth that it may be reused in different contexts, comparable to exploiting the deserialization vulnerabilities that had been just lately patched by SAP in July,” Onapsis warned.

This consists of –

Describing the menace actors as having in depth data of SAP purposes, the corporate is urging SAP customers to use the most recent fixes as quickly as potential, evaluate and limit entry to SAP purposes from the web, and monitor SAP purposes for any indicators of compromise.

The Hacker News Tags:Chained, Code, Execution, Exploit, Exposes, Flaws, Public, Remote, SAP, Systems, Unpatched

Post navigation

Previous Post: Australia’s TPG Telecom Investigating iiNet Hack
Next Post: New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers

Related Posts

Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server The Hacker News
Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page The Hacker News
GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections The Hacker News
Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries The Hacker News
CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark