Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SAP Patches Another Critical NetWeaver Vulnerability

Posted on May 13, 2025May 13, 2025 By CWS

Enterprise software program maker SAP on Tuesday launched 16 new and two up to date safety notes as a part of its Might 2025 Safety Patch Day. Two of the notes handle essential vulnerabilities in NetWeaver.

Probably the most extreme is an replace to a notice launched on April 24 to handle CVE-2025-31324 (CVSS rating of 10/10), a critical-severity bug in NetWeaver’s Visible Composer improvement server element that has been exploited within the wild since January, for distant code execution (RCE).

A whole lot of NetWeaver servers have been compromised via CVE-2025-31324’s exploitation, and software safety agency Onapsis warns that opportunistic attackers need to leverage webshells deployed in the course of the preliminary zero-day assaults.

The corporate is seeing “important exercise from attackers who’re utilizing public info to set off exploitation and abuse of webshells positioned by the unique attackers, who’ve presently gone darkish.”

Evaluation of the assaults has led to the invention of one other essential defect in NetWeaver’s Visible Composer. Tracked as CVE-2025-42999 (CVSS rating of 9.1) and described as an insecure deserialization challenge, the vulnerability was resolved with the second essential safety notice launched on SAP’s Might 2025 Safety Patch Day.

“SAP did a unbelievable job responding shortly to new info and circled a further patch to boost protections for the lively exploit within the wild,” Onapsis says.

Because the April 2025 safety notes had been rolled out, SAP additionally up to date two essential notes addressing code injection points in S/4HANA (CVE-2025-27429) and Panorama Transformation (CVE-2025-31330). Regardless of the completely different CVEs, the notes resolve the identical flaw.

On Tuesday, SAP launched 4 new and one up to date safety notes that handle high-severity bugs in Provider Relationship Administration, S/4HANA Cloud Non-public Version or On Premise, Enterprise Objects Enterprise Intelligence Platform, Panorama Transformation, and PDCE.Commercial. Scroll to proceed studying.

The software program maker additionally launched 11 new safety notes that resolve medium-severity vulnerabilities in varied merchandise.

SAP prospects are suggested to use the safety notes as quickly as potential, particularly given the continued exploitation of CVE-2025-31324.

Associated: Second Wave of Assaults Hitting SAP NetWeaver After Zero-Day Compromise

Associated: SAP Patches Important Code Injection Vulnerabilities

Associated: SAP Patches Excessive-Severity Vulnerabilities in Commerce, NetWeaver

Associated: SAP Releases 21 Safety Patches

Security Week News Tags:Critical, NetWeaver, Patches, SAP, Vulnerability

Post navigation

Previous Post: Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023
Next Post: Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments

Related Posts

CrowdStrike Plans Layoffs to Pursue $10B ARR Target Security Week News
Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying  Security Week News
US Sanctions Myanmar Militia Involved in Cyber Scams  Security Week News
Valuable Information Leaked in LockBit Ransomware Hack  Security Week News
Is AI Use in the Workplace Out of Control? Security Week News
Company and Personal Data Compromised in Recent Insight Partners Hack  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News