Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Vulnerability Patched in SAP NetWeaver

Posted on June 10, 2025June 10, 2025 By CWS

Enterprise software program maker SAP on Tuesday introduced the discharge of 14 new safety patches as a part of its June 2025 Safety Patch Day, together with a word addressing a critical-severity vulnerability in NetWeaver.

Tracked as CVE-2025-42989 (CVSS rating of 9.6), the vital bug is described as a lacking authorization examine within the NetWeaver utility server for ABAP.

Based on software program safety agency Onapsis, the difficulty resides within the Distant Perform Name (RFC) framework and permits attackers to bypass authorization checks and elevate their privileges.

“Below sure situations, authenticated attackers can bypass the usual authorization examine on authorization object S_RFC when utilizing transactional (tRFC) or queued RFCs (qRFC), resulting in an escalation of privileges. This permits an attacker to critically influence the appliance’s integrity and availability,” Onapsis explains.

Organizations that apply SAP’s word might have to assign extra S_RFC permissions to some customers, the safety agency factors out.

On June 2025 Safety Patch Day, SAP additionally launched 5 safety notes that tackle high-severity flaws, six that resolve medium-severity bugs, and two coping with low-severity points.

The high-severity vulnerabilities embody an info disclosure in GRC (AC Plugin), a lacking authorization examine in Enterprise Warehouse and Plug-In Foundation, an XSS defect in BusinessObjects, a listing traversal flaw in NetWeaver Visible Composer, and a number of bugs in MDM Server.

Profitable exploitation of those vulnerabilities might permit attackers to switch or management transmitted system credentials, delete database tables, entry delicate session info, learn and modify arbitrary recordsdata, trigger a denial-of-service situation, and acquire management of present shopper periods.Commercial. Scroll to proceed studying.

Between the Might Safety Patch Day and the contemporary batch of fixes, SAP additionally up to date 4 safety notes, together with two that resolve high-severity flaws in BusinessObjects and Panorama Transformation (PCL Foundation).

SAP makes no point out of any of those vulnerabilities being exploited in assaults, however customers are suggested to replace their purposes as quickly as doable, particularly following the widespread exploitation of two current NetWeaver bugs.

Associated: SAP Patches One other Exploited NetWeaver Vulnerability

Associated: SAP Zero-Day Focused Since January, Many Sectors Impacted

Associated: Cisco Patches Essential ISE Vulnerability With Public PoC

Security Week News Tags:Critical, NetWeaver, Patched, SAP, Vulnerability

Post navigation

Previous Post: Why Non-Human Identity Management is the Next Cybersecurity Frontier
Next Post: Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud

Related Posts

WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users Security Week News
Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions Security Week News
Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified Security Week News
Alleged Conti, TrickBot Gang Leader Unmasked Security Week News
Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning Security Week News
Europol Says Qilin Ransomware Reward Fake Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
  • CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
  • 7 Best Security Awareness Training Platforms For MSPs in 2026
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
  • CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
  • 7 Best Security Awareness Training Platforms For MSPs in 2026
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark