Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild

SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild

Posted on September 5, 2025September 5, 2025 By CWS

Sep 05, 2025Ravie LakshmananVulnerability / Enterprise Safety
A vital safety vulnerability impacting SAP S/4HANA, an Enterprise Useful resource Planning (ERP) software program, has come underneath energetic exploitation within the wild.
The command injection vulnerability, tracked as CVE-2025-42957 (CVSS rating: 9.9), was mounted by SAP as a part of its month-to-month updates final month.
“SAP S/4HANA permits an attacker with person privileges to take advantage of a vulnerability within the operate module uncovered through RFC,” in accordance with an outline of the flaw within the NIST Nationwide Vulnerability Database (NVD). “This flaw permits the injection of arbitrary ABAP code into the system, bypassing important authorization checks.

Profitable exploration of the defect might end in a full system compromise of the SAP surroundings, subverting the confidentiality, integrity, and availability of the system. Briefly, it could actually allow attackers to change the SAP database, create superuser accounts with SAP_ALL privileges, obtain password hashes, and alter enterprise processes.
SecurityBridge Risk Analysis Labs, in an alert issued Thursday, stated it has noticed energetic exploitation of the flaw, stating the problem impacts each on-premise and Non-public Cloud editions.
“Exploitation requires entry solely to a low-privileged person to totally compromise an SAP system,” the corporate stated. “A whole system compromise with minimal effort required, the place profitable exploitation can simply result in fraud, knowledge theft, espionage, or the set up of ransomware.”
It additionally famous that whereas widespread exploitation has not but been detected, menace actors possess the data to make use of it, and that reverse engineering the patch to create an exploit is “comparatively straightforward.”
Because of this, organizations are suggested to use the patches as quickly as doable, monitor logs for suspicious RFC calls or new admin customers, and guarantee applicable segmentation and backups are in place.
“Contemplate implementing SAP UCON to limit RFC utilization and overview and prohibit entry to authorization object S_DMIS exercise 02,” it additionally stated.

The Hacker News Tags:Critical, CVE202542957, Exploited, S4HANA, SAP, Vulnerability, Wild

Post navigation

Previous Post: CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks
Next Post: Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System

Related Posts

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions The Hacker News
Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories The Hacker News
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign The Hacker News
INTERPOL’s Cybercrime Crackdown Nets 651 Arrests in Africa INTERPOL’s Cybercrime Crackdown Nets 651 Arrests in Africa The Hacker News
Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More The Hacker News
New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark