Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System

Posted on September 10, 2025September 10, 2025 By CWS

A vital vulnerability CVE-2025-42922 has been found in SAP NetWeaver that permits an authenticated, low-privileged attacker to execute arbitrary code and obtain a full system compromise.

The flaw resides within the Deploy Internet Service add mechanism, the place inadequate entry management validation permits the add and execution of malicious information.

This vulnerability poses a major threat to organizations counting on affected SAP methods, as it may be exploited to realize full management over the server.

SAP NetWeaver Vulnerability

In response to Vahagn Vardanian, the foundation reason for the vulnerability is an insecure file add operate inside the Deploy Internet Service.

The service incorrectly accepts multipart/form-data requests with out correct Function-Primarily based Entry Management (RBAC) enforcement or validation of the file sort and content material.

This oversight is because of incorrect authentication annotations and inadequate function checks within the software’s code.

SAP NetWeaver Vulnerability

Consequently, an attacker who has obtained any legitimate low-level consumer credentials can bypass safety controls that ought to limit file deployment capabilities to administrative customers solely, Vahagn Vardanian mentioned.

The mechanism fails to confirm if the authenticated consumer has the mandatory permissions to carry out such a delicate operation, making a direct path to code execution.

An attacker can exploit this vulnerability by first having access to a low-privileged consumer account.

Utilizing these credentials, they will authenticate to the weak Deploy Internet Service and craft a multipart request containing a malicious file, akin to a JavaServer Pages (JSP) script.

The appliance improperly accepts and uploads this file to a listing on the server the place it may be executed.

The attacker then merely must set off the execution of the uploaded file by accessing its URL. Profitable exploitation leads to arbitrary code execution with the privileges of the SAP service account.

This permits the menace actor to escalate privileges, transfer laterally throughout the community, exfiltrate delicate knowledge, or deploy additional malware, main to an entire server takeover.

Mitigations

To deal with this vital difficulty, organizations are strongly urged to use the patches launched in SAP Safety Notice 3643865 instantly.

Earlier than patching, directors ought to carry out a dependency evaluation as outlined in SAP Notice 1974464. For methods that can’t be patched straight away, SAP has offered a brief workaround in KBA 3646072.

As a supplementary measure, entry to the Deploy Internet Service ought to be restricted to administrative customers solely.

Safety groups ought to audit system logs for Indicators of Compromise (IOCs), akin to HTTP POST requests to DeployWS endpoints from non-administrative accounts, multipart/form-data submissions containing executable file varieties (JSP, WAR, EAR), or deployment actions occurring at uncommon hours.

A pattern filter for logs or a Internet Software Firewall (WAF) may very well be supply.consumer != “admin” AND http.technique == “POST” AND http.path CONTAINS “DeployWS”.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Arbitrary, Attackers, Code, Compromise, Critical, Execute, NetWeaver, SAP, System, Vulnerability

Post navigation

Previous Post: Workday Confirms Data Breach – Hackers Accessed Customers Data and Case Information
Next Post: Windows BitLocker Vulnerability Let Attackers Elevate Privileges

Related Posts

YONO SBI Banking App Vulnerability Let Attackers Execute a Man-in-the-Middle Attack Cyber Security News
Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens Cyber Security News
CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks Cyber Security News
Mastering Intrusion Detection Systems – A Technical Guide Cyber Security News
Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number Cyber Security News
Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used
  • Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack
  • Accessible AI-Powered Cybersecurity Platform for SME Security
  • CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
  • Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used
  • Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack
  • Accessible AI-Powered Cybersecurity Platform for SME Security
  • CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
  • Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News