Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover

SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover

Posted on July 8, 2025July 8, 2025 By CWS

Enterprise software program maker SAP on Tuesday introduced the discharge of 27 new and 4 up to date safety notes as a part of its July 2025 Safety Patch Day, together with six that deal with essential vulnerabilities.

On the high of the record is an replace for a observe launched in Could, which addresses 5 safety defects in its Provider Relationship Administration (SRM).

SAP initially marked the observe as high-priority, primarily based on the severity rating of crucial of those bugs. Now, it has up to date the ranking to ‘essential’, upon studying that the influence of certainly one of these points is far greater than initially decided.

The CVSS rating for the bug, tracked as CVE-2025-30012, has been up to date from 3.9 to 10/10, after it was decided that it might be abused by unauthenticated attackers to execute arbitrary OS instructions with administrative privileges.

The difficulty exists as a result of the Stay Public sale Cockpit part of SRM makes use of a deprecated java applet that will decode crafted malicious requests, ensuing within the insecure deserialization of knowledge and command execution.

The second observe in SAP’s July 2025 Safety Patch Day advisory addresses CVE-2025-42967 (CVSS rating of 9.9), a distant code execution vulnerability in S/4HANA and SCM.

An attacker with consumer stage privileges can exploit the flaw to create a brand new report containing their very own code, which may permit them to take full management of a weak SAP system.

SAP’s contemporary spherical of safety notes additionally resolves 4 critical-severity insecure deserialization flaws in varied elements of NetWeaver. Commercial. Scroll to proceed studying.

The problems, tracked as CVE-2025-42963, CVE-2025-42964, CVE-2025-42966, and CVE-2025-42980 (CVSS rating of 9.1), might be exploited by attackers with excessive privileges to compromise the applying and system, or take full management of the host system, safety agency Onapsis explains.

4 high-severity points in NetWeaver, Enterprise Objects, and Enterprise Warehouse have been additionally patched this week, and a high-priority observe launched final month to deal with a listing traversal in NetWeaver’s Visible Composer part was up to date.

SAP customers are suggested to replace their deployments as quickly as doable. Though the software program maker makes no point out of any of those vulnerabilities being exploited within the wild, menace actors are recognized to have focused SAP flaws to compromise enterprise environments.

Associated: Crucial Vulnerability Patched in SAP NetWeaver

Associated: SAP Patches One other Exploited NetWeaver Vulnerability

Associated: SAP Zero-Day Probably Exploited by Preliminary Entry Dealer

Associated: SAP Patches Crucial Code Injection Vulnerabilities

Security Week News Tags:Code, Critical, Execution, Flaws, Full, Patches, Remote, SAP, System, Takeover

Post navigation

Previous Post: Exploits, Technical Details Released for CitrixBleed2 Vulnerability
Next Post: Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension

Related Posts

Microsoft Enhances Windows Security with New Safeguards Microsoft Enhances Windows Security with New Safeguards Security Week News
Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments Security Week News
Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up Security Week News
MATLAB Maker MathWorks Recovering From Ransomware Attack MATLAB Maker MathWorks Recovering From Ransomware Attack Security Week News
Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks Security Week News
Former CISA Director Jen Easterly Appointed CEO of RSAC Former CISA Director Jen Easterly Appointed CEO of RSAC Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News