Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution

Posted on August 19, 2025August 19, 2025 By CWS

Aug 19, 2025Ravie LakshmananVulnerability / Cyber Espionage
A brand new exploit combining two crucial, now-patched safety flaws in SAP NetWeaver has emerged within the wild, placing organizations susceptible to system compromise and information theft.
The exploit in query chains collectively CVE-2025-31324 and CVE-2025-42999 to bypass authentication and obtain distant code execution, SAP safety firm Onapsis mentioned.

CVE-2025-31324 (CVSS rating: 10.0) – Lacking Authorization examine in SAP NetWeaver’s Visible Composer growth server
CVE-2025-42999 (CVSS rating: 9.1) – Insecure Deserialization in SAP NetWeaver’s Visible Composer growth server

The vulnerabilities had been addressed by SAP again in April and Could 2025, however not earlier than they had been abused by menace actors as zero-days since a minimum of March.

A number of ransomware and information extortion teams, together with Qilin, BianLian, and RansomExx, have been noticed weaponizing the issues, to not point out a number of China-nexus espionage crews who’ve additionally put them to make use of in assaults focusing on crucial infrastructure networks.
The existence of the exploit was first reported final week by vx-underground, which mentioned it was launched by Scattered Lapsus$ Hunters, a brand new fluid alliance shaped by Scattered Spider and ShinyHunters.
“These vulnerabilities enable an unauthenticated attacker to execute arbitrary instructions on the goal SAP System, together with the add of arbitrary recordsdata,” Onapsis mentioned. “This will result in distant code execution (RCE) and a whole takeover of the affected system and SAP enterprise information and processes.”
The exploit, the corporate added, can not solely be used to deploy internet shells, but additionally be weaponized to conduct living-off-the-land (LotL) assaults by instantly executing working system instructions with out having to drop extra artifacts on the compromised system. These instructions are run with SAP administrator privileges, granting unhealthy actors unauthorized entry to SAP information and system sources.

Particularly, the assault chain first makes use of CVE-2025-31324 to sidestep authentication and add the malicious payload to the server. The deserialization vulnerability (CVE-2025-42999) is then exploited to unpack the payload and execute it with elevated permissions.
“The publication of this deserialization gadget is especially regarding because of the truth that it may be reused in different contexts, comparable to exploiting the deserialization vulnerabilities that had been just lately patched by SAP in July,” Onapsis warned.

This consists of –

Describing the menace actors as having in depth data of SAP purposes, the corporate is urging SAP customers to use the most recent fixes as quickly as potential, evaluate and limit entry to SAP purposes from the web, and monitor SAP purposes for any indicators of compromise.

The Hacker News Tags:Chained, Code, Execution, Exploit, Exposes, Flaws, Public, Remote, SAP, Systems, Unpatched

Post navigation

Previous Post: Australia’s TPG Telecom Investigating iiNet Hack
Next Post: New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers

Related Posts

Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper The Hacker News
Europol Arrests XSS Forum Admin in Kyiv After 12-Year Run Operating Cybercrime Marketplace The Hacker News
Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures The Hacker News
Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File The Hacker News
6 Steps to 24/7 In-House SOC Success The Hacker News
New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform
  • Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do
  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform
  • Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do
  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News