Site icon TheCyberThrone

CISA Adds Microsoft and SAP NetWeaver Zero-Day to KEV Catalog

Advertisements

The Cybersecurity and Infrastructure Security Agency (CISA) has recently expanded its Known Exploited Vulnerabilities (KEV) Catalog, adding multiple Microsoft Patch Tuesday vulnerabilities and a critical zero-day flaw in SAP NetWeaver. These vulnerabilities have been actively exploited in the wild, posing severe security threats to organizations relying on Windows, Azure cloud services, and SAP enterprise applications.

With the June 3, 2025 deadline approaching for Federal Civilian Executive Branch (FCEB) agencies to patch these vulnerabilities under Binding Operational Directive (BOD) 22-01, enterprises across the globe are urged to apply fixes immediately and implement proactive threat mitigation strategies to prevent exploitation.

1. Microsoft Patch Tuesday Vulnerabilities Added to KEV

Microsoft’s May 2025 Patch Tuesday contained critical vulnerabilities, including five zero-days that have been actively exploited by cybercriminals. These flaws enable remote code execution (RCE), privilege escalation, and unauthorized system control, making them high-priority threats.

Zero-Day Vulnerabilities Under Active Exploitation

1️⃣ CVE-2025-30400 – Windows Desktop Window Manager (DWM) Privilege Escalation

2️⃣ CVE-2025-32701 – Windows Common Log File System (CLFS) Privilege Escalation

3️⃣ CVE-2025-32706 – Windows CLFS Privilege Escalation

4️⃣ CVE-2025-32709 – Windows Ancillary Function Driver for WinSock Privilege Escalation

5️⃣ CVE-2025-30397 – Microsoft Scripting Engine Remote Code Execution (RCE)

2. SAP NetWeaver Zero-Day (CVE-2025-31324) Added to KEV

SAP’s NetWeaver platform, a critical component in enterprise resource planning (ERP) environments, is facing a severe security risk with CVE-2025-31324, which has been actively exploited since March 2025.

Key Details

How the Exploit Works

🚨 Attackers are exploiting Visual Composer’s metadata uploader feature to install JSP-based webshells, granting long-term backdoor access to SAP NetWeaver servers.
🚨 These malicious webshells allow remote attackers to execute commands, steal sensitive enterprise data, and pivot into corporate IT networks.
🚨 Multiple threat groups are leveraging this vulnerability to breach ERP systems, targeting industries such as finance, manufacturing, retail, and government agencies.

3. Indicators of Compromise (IoCs)

Organizations should monitor their Windows and SAP systems for signs of exploitation related to these vulnerabilities:

Microsoft IoCs

🔹 Unexpected privilege escalations in Windows event logs
🔹 Unauthorized execution of administrative tasks in CLFS and DWM logs
🔹 Inbound connections from unknown IP addresses targeting AFD and scripting engine APIs

SAP NetWeaver IoCs

🔸 Unauthorized file uploads to /developmentserver/metadatauploader
🔸 Suspicious JSP execution from unknown locations
🔸 Unusual outbound connections from compromised SAP servers to attacker-controlled IP addresses

4. Mitigation Strategies

A. Apply Security Updates Immediately

Microsoft has released patches for affected Windows vulnerabilities. Enterprises should update Windows and Azure deployments ASAP.
SAP has released an emergency patch via Security Note #3594142. IT teams must upgrade SAP NetWeaver immediately.

B. Restrict Access to Vulnerable Components

🔹 Disable Windows CLFS and AFD drivers if not mission-critical.
🔹 Disable Visual Composer in SAP NetWeaver if not required.
🔹 Implement firewall rules blocking unauthorized requests to SAP metadata uploader endpoints.

C. Monitor for Exploitation Attempts

🔸 Deploy Intrusion Detection Systems (IDS) and Endpoint Detection & Response (EDR) solutions.
🔸 Audit logs for unauthorized file uploads and privilege escalations.
🔸 Activate alert mechanisms for unusual outbound traffic from ERP and cloud infrastructures.

5. Compliance Requirements & Federal Mandates

Binding Operational Directive (BOD) 22-01

📢 Federal Civilian Executive Branch (FCEB) agencies must remediate these vulnerabilities by June 3, 2025.
📢 Organizations failing to patch may face regulatory penalties and security audits.

6. Conclusion

🚨 The addition of Microsoft zero-days and SAP NetWeaver CVE-2025-31324 to CISA’s KEV Catalog underscores the urgent need for patching and proactive defense.
🚨 Organizations using Windows and SAP ERP solutions must deploy security fixes, harden endpoint protection, and monitor for exploitation attempts.
🚨 Failure to address these vulnerabilities may result in data breaches, ransomware infections, and operational disruptions.

🔗 CISA Advisory: Read more

Exit mobile version