Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution

Posted on August 19, 2025August 19, 2025 By CWS

Aug 19, 2025Ravie LakshmananVulnerability / Cyber Espionage
A brand new exploit combining two crucial, now-patched safety flaws in SAP NetWeaver has emerged within the wild, placing organizations susceptible to system compromise and information theft.
The exploit in query chains collectively CVE-2025-31324 and CVE-2025-42999 to bypass authentication and obtain distant code execution, SAP safety firm Onapsis mentioned.

CVE-2025-31324 (CVSS rating: 10.0) – Lacking Authorization examine in SAP NetWeaver’s Visible Composer growth server
CVE-2025-42999 (CVSS rating: 9.1) – Insecure Deserialization in SAP NetWeaver’s Visible Composer growth server

The vulnerabilities had been addressed by SAP again in April and Could 2025, however not earlier than they had been abused by menace actors as zero-days since a minimum of March.

A number of ransomware and information extortion teams, together with Qilin, BianLian, and RansomExx, have been noticed weaponizing the issues, to not point out a number of China-nexus espionage crews who’ve additionally put them to make use of in assaults focusing on crucial infrastructure networks.
The existence of the exploit was first reported final week by vx-underground, which mentioned it was launched by Scattered Lapsus$ Hunters, a brand new fluid alliance shaped by Scattered Spider and ShinyHunters.
“These vulnerabilities enable an unauthenticated attacker to execute arbitrary instructions on the goal SAP System, together with the add of arbitrary recordsdata,” Onapsis mentioned. “This will result in distant code execution (RCE) and a whole takeover of the affected system and SAP enterprise information and processes.”
The exploit, the corporate added, can not solely be used to deploy internet shells, but additionally be weaponized to conduct living-off-the-land (LotL) assaults by instantly executing working system instructions with out having to drop extra artifacts on the compromised system. These instructions are run with SAP administrator privileges, granting unhealthy actors unauthorized entry to SAP information and system sources.

Particularly, the assault chain first makes use of CVE-2025-31324 to sidestep authentication and add the malicious payload to the server. The deserialization vulnerability (CVE-2025-42999) is then exploited to unpack the payload and execute it with elevated permissions.
“The publication of this deserialization gadget is especially regarding because of the truth that it may be reused in different contexts, comparable to exploiting the deserialization vulnerabilities that had been just lately patched by SAP in July,” Onapsis warned.

This consists of –

Describing the menace actors as having in depth data of SAP purposes, the corporate is urging SAP customers to use the most recent fixes as quickly as potential, evaluate and limit entry to SAP purposes from the web, and monitor SAP purposes for any indicators of compromise.

The Hacker News Tags:Chained, Code, Execution, Exploit, Exposes, Flaws, Public, Remote, SAP, Systems, Unpatched

Post navigation

Previous Post: Australia’s TPG Telecom Investigating iiNet Hack
Next Post: New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers

Related Posts

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique The Hacker News
Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries The Hacker News
Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks The Hacker News
Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions The Hacker News
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft The Hacker News
Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News