Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Recent SAP S/4HANA Vulnerability Exploited in Attacks

Posted on September 5, 2025September 5, 2025 By CWS

A not too long ago patched SAP S/4HANA vulnerability tracked as CVE-2025-42957 is being exploited within the wild, SAP safety options supplier SecurityBridge warned on Thursday.

The vulnerability was mounted by SAP in its enterprise useful resource planning (ERP) software program in August, after being responsibly disclosed to the seller by SecurityBridge in late June. 

CVE-2025-42957 has been assigned a ‘essential’ severity ranking and it could possibly enable an attacker with low privileges to execute arbitrary code and take full management of the affected SAP system. 

SecurityBridge is warning organizations in regards to the exploitation of the vulnerability, however the safety firm’s director of analysis, Joris van de Vis, informed SecurityWeek that they aren’t disclosing additional particulars on the assaults presently. 

Van de Vis did verify that SecurityBridge has seen malicious exploitation of CVE-2025-42957 in buyer environments, noting that the corporate is conscious of a number of exploits.

The professional additionally identified that the vulnerability “is of comparatively low complexity” and “expert professionals with good SAP and/or safety experience can readily develop working exploits”.

SecurityBridge stated in its weblog submit that profitable exploitation of the flaw can allow an attacker to delete knowledge from or insert knowledge into the SAP database, create new SAP customers with elevated privileges, obtain password hashes, and modify enterprise processes. 

“An entire system compromise with minimal effort required, the place profitable exploitation can simply result in fraud, knowledge theft, espionage, or the set up of ransomware,” SecurityBridge warned.Commercial. Scroll to proceed studying.

The safety agency stated it has not seen widespread exploitation, however organizations involved about assaults can examine logs for indicators of compromise (IoCs) resembling suspicious RFC calls, new admin customers, and surprising ABAP code adjustments.

It’s not unusual for risk actors to use SAP product vulnerabilities of their assaults. CISA’s Recognized Exploited Vulnerabilities (KEV) catalog presently consists of 14 SAP product flaws. 

Associated: SAP Patches Crucial Flaws That May Enable Distant Code Execution, Full System Takeover

Associated: Organizations Warned of Exploited SAP, Gpac and D-Hyperlink Vulnerabilities

Associated: Exploited Vulnerability Exposes Over 400 SAP NetWeaver Servers to Assaults

Security Week News Tags:Attacks, Exploited, S4HANA, SAP, Vulnerability

Post navigation

Previous Post: VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages
Next Post: Automation Is Redefining Pentest Delivery

Related Posts

O2 Service Vulnerability Exposed User Location Security Week News
Varonis Acquires Email Security Firm SlashNext Security Week News
Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise Security Week News
Technical Details Published for Critical Cisco IOS XE Vulnerability Security Week News
Chain IQ, UBS Data Stolen in Ransomware Attack Security Week News
Google Says Android pKVM Earns Highest Level of Security Assurance Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload
  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload
  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News