Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System

Posted on September 5, 2025September 5, 2025 By CWS

A essential vulnerability in SAP S/4HANA is being actively exploited within the wild, permitting attackers with low-level consumer entry to achieve full management over affected programs.

The vulnerability, tracked as CVE-2025-42957, carries a CVSS rating of 9.9 out of 10, signaling a extreme and imminent risk to organizations working all releases of S/4HANA, each on-premise and in non-public clouds.

The flaw was found by researchers at SecurityBridge Menace Analysis Labs, who’ve now verified that malicious actors are already utilizing it.

SAP launched a patch on August 11, 2025, and consultants are urging all prospects to use the safety updates instantly.

SAP S/4HANA Vulnerability Actively Exploited

Profitable exploitation of this ABAP code injection vulnerability grants an attacker full administrative privileges. This permits them to entry the underlying working system and achieve full management over all knowledge inside the SAP system.

The results are dire and might embody the theft of delicate enterprise data, monetary fraud, espionage, or the deployment of ransomware.

An attacker might delete or insert knowledge instantly into the database, create new administrator accounts with SAP_ALL privileges, obtain password hashes, and modify core enterprise processes with minimal effort.

What makes CVE-2025-42957 notably harmful is its low assault complexity. An attacker solely wants entry to a low-privileged consumer account, which could possibly be obtained by means of phishing or different widespread strategies.

From there, they’ll exploit the flaw over the community with none consumer interplay, escalating their privileges to attain a full system compromise.

SecurityBridge, which responsibly disclosed the vulnerability to SAP on June 27, 2025, warns that unpatched programs are uncovered to quick threat.

As a result of SAP’s ABAP code is open, reverse engineering the patch to create a working exploit is a comparatively easy activity for expert attackers.

Mitigations

Safety consultants have issued clear steering for organizations to guard themselves:

Patch Instantly: Apply SAP’s August 2025 safety updates, particularly SAP Notes 3627998 and 3633838, at once.

Assessment Entry: Prohibit entry to the S_DMIS authorization object and take into account implementing SAP UCON to restrict RFC utilization.

Monitor System Logs: Actively look ahead to suspicious RFC calls, the creation of latest high-privilege customers, or surprising modifications to ABAP code.

Harden Defenses: Guarantee strong system segmentation, common backups, and SAP-specific safety monitoring options are in place to detect and reply to assaults.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Actively, Compromise, Critical, Exploited, Fully, S4HANA, SAP, System, Vulnerability

Post navigation

Previous Post: SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild
Next Post: 10 Best Internal Network Penetration Testing Companies in 2025

Related Posts

FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User Cyber Security News
Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365 Cyber Security News
First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account Cyber Security News
Multiple 0-days to Bypass BitLocker and Extract All Protected Data Cyber Security News
UK Retailer Co-op Confirms 6.5 Million Members’ Data Stolen in Massive Cyberattacks Cyber Security News
Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News