Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System

Posted on September 5, 2025September 5, 2025 By CWS

A essential vulnerability in SAP S/4HANA is being actively exploited within the wild, permitting attackers with low-level consumer entry to achieve full management over affected programs.

The vulnerability, tracked as CVE-2025-42957, carries a CVSS rating of 9.9 out of 10, signaling a extreme and imminent risk to organizations working all releases of S/4HANA, each on-premise and in non-public clouds.

The flaw was found by researchers at SecurityBridge Menace Analysis Labs, who’ve now verified that malicious actors are already utilizing it.

SAP launched a patch on August 11, 2025, and consultants are urging all prospects to use the safety updates instantly.

SAP S/4HANA Vulnerability Actively Exploited

Profitable exploitation of this ABAP code injection vulnerability grants an attacker full administrative privileges. This permits them to entry the underlying working system and achieve full management over all knowledge inside the SAP system.

The results are dire and might embody the theft of delicate enterprise data, monetary fraud, espionage, or the deployment of ransomware.

An attacker might delete or insert knowledge instantly into the database, create new administrator accounts with SAP_ALL privileges, obtain password hashes, and modify core enterprise processes with minimal effort.

What makes CVE-2025-42957 notably harmful is its low assault complexity. An attacker solely wants entry to a low-privileged consumer account, which could possibly be obtained by means of phishing or different widespread strategies.

From there, they’ll exploit the flaw over the community with none consumer interplay, escalating their privileges to attain a full system compromise.

SecurityBridge, which responsibly disclosed the vulnerability to SAP on June 27, 2025, warns that unpatched programs are uncovered to quick threat.

As a result of SAP’s ABAP code is open, reverse engineering the patch to create a working exploit is a comparatively easy activity for expert attackers.

Mitigations

Safety consultants have issued clear steering for organizations to guard themselves:

Patch Instantly: Apply SAP’s August 2025 safety updates, particularly SAP Notes 3627998 and 3633838, at once.

Assessment Entry: Prohibit entry to the S_DMIS authorization object and take into account implementing SAP UCON to restrict RFC utilization.

Monitor System Logs: Actively look ahead to suspicious RFC calls, the creation of latest high-privilege customers, or surprising modifications to ABAP code.

Harden Defenses: Guarantee strong system segmentation, common backups, and SAP-specific safety monitoring options are in place to detect and reply to assaults.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Actively, Compromise, Critical, Exploited, Fully, S4HANA, SAP, System, Vulnerability

Post navigation

Previous Post: SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild
Next Post: 10 Best Internal Network Penetration Testing Companies in 2025

Related Posts

Nevada IT Systems Hit by Cyberattack Cyber Security News
UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages Cyber Security News
Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague Cyber Security News
Lumma Infostealers Developers Trying Hard To Conduct Business As Usual Cyber Security News
Post-Quantum Cryptography What CISOs Need to Know Cyber Security News
DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
  • SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month
  • TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
  • SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month
  • TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News