Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws

Posted on September 10, 2025September 10, 2025 By CWS

Sep 10, 2025Ravie LakshmananSoftware Safety / Vulnerability

SAP on Tuesday launched safety updates to handle a number of safety flaws, together with three essential vulnerabilities in SAP Netweaver that might end in code execution and the add arbitrary recordsdata.
The vulnerabilities are listed under –

CVE-2025-42944 (CVSS rating: 10.0) – A deserialization vulnerability in SAP NetWeaver that might permit an unauthenticated attacker to submit a malicious payload to an open port by means of the RMI-P4 module, leading to working system command execution
CVE-2025-42922 (CVSS rating: 9.9) – An insecure file operations vulnerability in SAP NetWeaver AS Java that might permit an attacker authenticated as a non-administrative person to add an arbitrary file
CVE-2025-42958 (CVSS rating: 9.1) – A lacking authentication examine vulnerability within the SAP NetWeaver software on IBM i-series that might permit extremely privileged unauthorized customers to learn, modify, or delete delicate data, in addition to entry administrative or privileged functionalities

“[CVE-2025-42944] permits an unauthenticated attacker to execute arbitrary OS instructions by submitting a malicious payload to an open port,” Onapsis stated. “A profitable exploit can result in full compromise of the applying. As a short lived workaround, clients ought to add P4 port filtering on the ICM degree to stop unknown hosts from connecting to the P4 port.”
Additionally addressed by SAP is a high-severity lacking enter validation bug in SAP S/4HANA (CVE-2025-42916, CVSS rating: 8.1) that might allow an attacker with excessive privilege entry to ABAP reviews to delete the content material of arbitrary database tables, ought to the tables not be protected by an authorization group.
The patches arrive days after SecurityBridge and Pathlock disclosed {that a} essential safety defect in SAP S/4HANA that was mounted by the corporate final month (CVE-2025-42957, CVSS rating: 9.9) has come beneath energetic exploitation within the wild.
Whereas there isn’t a proof that the newly disclosed points have been weaponized by unhealthy actors, it is important that customers transfer to use the required updates as quickly as doable for optimum safety.

The Hacker News Tags:Critical, CVSS, Exploited, Flaws, NetWeaver, Patches, Previously, S4HANA, SAP

Post navigation

Previous Post: How to Use Mobile Device Management (MDM)
Next Post: Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts

Related Posts

U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure The Hacker News
Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session The Hacker News
Identity Security Has an Automation Problem—And It’s Bigger Than You Think The Hacker News
Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety The Hacker News
Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do The Hacker News
Pen Testing for Compliance Only? It’s Time to Change Your Approach The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News