Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerability Patched in SAP NetWeaver

Critical Vulnerability Patched in SAP NetWeaver

Posted on June 10, 2025June 10, 2025 By CWS

Enterprise software program maker SAP on Tuesday introduced the discharge of 14 new safety patches as a part of its June 2025 Safety Patch Day, together with a word addressing a critical-severity vulnerability in NetWeaver.

Tracked as CVE-2025-42989 (CVSS rating of 9.6), the vital bug is described as a lacking authorization examine within the NetWeaver utility server for ABAP.

Based on software program safety agency Onapsis, the difficulty resides within the Distant Perform Name (RFC) framework and permits attackers to bypass authorization checks and elevate their privileges.

“Below sure situations, authenticated attackers can bypass the usual authorization examine on authorization object S_RFC when utilizing transactional (tRFC) or queued RFCs (qRFC), resulting in an escalation of privileges. This permits an attacker to critically influence the appliance’s integrity and availability,” Onapsis explains.

Organizations that apply SAP’s word might have to assign extra S_RFC permissions to some customers, the safety agency factors out.

On June 2025 Safety Patch Day, SAP additionally launched 5 safety notes that tackle high-severity flaws, six that resolve medium-severity bugs, and two coping with low-severity points.

The high-severity vulnerabilities embody an info disclosure in GRC (AC Plugin), a lacking authorization examine in Enterprise Warehouse and Plug-In Foundation, an XSS defect in BusinessObjects, a listing traversal flaw in NetWeaver Visible Composer, and a number of bugs in MDM Server.

Profitable exploitation of those vulnerabilities might permit attackers to switch or management transmitted system credentials, delete database tables, entry delicate session info, learn and modify arbitrary recordsdata, trigger a denial-of-service situation, and acquire management of present shopper periods.Commercial. Scroll to proceed studying.

Between the Might Safety Patch Day and the contemporary batch of fixes, SAP additionally up to date 4 safety notes, together with two that resolve high-severity flaws in BusinessObjects and Panorama Transformation (PCL Foundation).

SAP makes no point out of any of those vulnerabilities being exploited in assaults, however customers are suggested to replace their purposes as quickly as doable, particularly following the widespread exploitation of two current NetWeaver bugs.

Associated: SAP Patches One other Exploited NetWeaver Vulnerability

Associated: SAP Zero-Day Focused Since January, Many Sectors Impacted

Associated: Cisco Patches Essential ISE Vulnerability With Public PoC

Security Week News Tags:Critical, NetWeaver, Patched, SAP, Vulnerability

Post navigation

Previous Post: Why Non-Human Identity Management is the Next Cybersecurity Frontier
Next Post: Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud

Related Posts

Cybersecurity M&A Roundup: 27 Deals Announced in August 2025 Cybersecurity M&A Roundup: 27 Deals Announced in August 2025 Security Week News
Chinese Hackers Target Chinese Users With RAT, Rootkit Chinese Hackers Target Chinese Users With RAT, Rootkit Security Week News
High-Severity Remote Code Execution Vulnerability Patched in OpenSSL High-Severity Remote Code Execution Vulnerability Patched in OpenSSL Security Week News
Critical Apache Tika Vulnerability Leads to XXE Injection Critical Apache Tika Vulnerability Leads to XXE Injection Security Week News
Defend Against Identity Threats: Join Our Webinar Defend Against Identity Threats: Join Our Webinar Security Week News
TARmageddon Flaw in Popular Rust Library Leads to RCE TARmageddon Flaw in Popular Rust Library Leads to RCE Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News