Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Exploit Poses Threat to SAP NetWeaver Instances

Posted on August 19, 2025August 19, 2025 By CWS

Dozens of SAP NetWeaver situations are prone to compromise after a risk actor launched a brand new working exploit that chains two critical-severity vulnerabilities for code execution.

The issues, tracked as CVE-2025-31324 (CVSS rating of 10) and CVE-2025-42999 (CVSS rating of 9.1), are described as a lacking authorization examine problem and an insecure deserialization bug, and had been resolved with safety notes launched in April and Might, respectively.

Each safety defects had been exploited within the wild earlier than fixes had been rolled out for them, for the deployment of internet shells and distant command execution. Ransomware teams corresponding to BianLian and RansomEXX, and Chinese language APTs had been seen focusing on them.

On Friday, risk intelligence and analysis venture Vx-Underground warned that somebody apparently linked to the Scattered Spider cybercrime group launched on Telegram a brand new – allegedly zero-day – exploit focusing on SAP NetWeaver situations.

After analyzing the exploit, enterprise software safety agency Onapsis concluded that it was truly constructed to chain the recognized flaws CVE-2025-31324 and CVE-2025-42999 for the execution of arbitrary system instructions with administrator privileges.

“In essence, the attackers first use the lacking authentication vulnerability (CVE-2025-31324) to entry the vital performance with out authentication and get their malicious payload to the server. Then, they exploit the de-serialization flaw (CVE-2025-42999) to deserialize the malicious payload and execute that code with the privileges of the SAP system,” Onapsis explains.

The safety agency warns that the deserialization gadget on this exploit may very well be reused in different contexts, such because the exploitation of deserialization flaws that SAP patched in July.

“This doubtlessly opens up new assault vectors in different areas of SAP purposes. It’s a strong software in an attacker’s arsenal, and its publication within the wild is a big occasion. Organizations ought to guarantee these SAP vulnerabilities have been additionally promptly patched of their environments,” Onapsis notes.Commercial. Scroll to proceed studying.

Whereas the exploit doesn’t goal new SAP vulnerabilities, NetWeaver situations that haven’t been patched towards CVE-2025-31324 and CVE-2025-42999 are uncovered to a recent wave of assaults.

In line with information from The Shadowserver Basis, over 50 NetWeaver servers had been nonetheless weak to CVE-2025-31324 as of August 18. The quantity is considerably decrease in comparison with the 400 weak situations noticed on the finish of April.

Associated: SAP Patches Essential S/4HANA Vulnerability

Associated: A whole bunch of N-able N-central Situations Affected by Exploited Vulnerabilities

Associated: OT Networks Focused in Widespread Exploitation of Erlang/OTP Vulnerability

Associated: Vulnerabilities in Xerox Print Orchestration Product Enable Distant Code Execution

Security Week News Tags:Exploit, Instances, NetWeaver, Poses, SAP, Threat

Post navigation

Previous Post: 1.1 Million Unique Records Identified in Allianz Life Data Leak
Next Post: Why Your Security Culture is Critical to Mitigating Cyber Risk

Related Posts

Amazon Disrupts Russian Hacking Campaign Targeting Microsoft Users Security Week News
UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features Security Week News
PromptLock: First AI-Powered Ransomware Emerges Security Week News
Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps Security Week News
Webinar Today: Inside the First 72 hours of a Cyber Event Security Week News
Nudge Security Raises $22.5 Million in Series A Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark