Site icon TheCyberThrone

CVE-2025-42957: Critical SAP S/4HANA Code Injection Vulnerability – Exploited in the Wild

Advertisements

Executive Summary

A newly disclosed and actively exploited vulnerability, CVE-2025-42957, has sent shockwaves through the SAP ecosystem. This critical flaw (CVSS 9.9) affects all SAP S/4HANA instances—both Private Cloud and On-Premise—and enables low-privileged users to execute arbitrary code, potentially resulting in full system compromise. Immediate patching is imperative for all running SAP S/4HANA environments.

What Makes CVE-2025-42957 So Dangerous?

Technical Deep Dive

CVE-2025-42957 is categorized as an ABAP code injection flaw (CWE-94, Improper Control of Generation of Code)[2]. The vulnerability arises from insufficient input validation in specific RFC-enabled function modules. When invoked by an authenticated user (with limited access), these modules process attacker-supplied parameters directly into dynamic ABAP constructs, such as INSERT REPORT or GENERATE SUBROUTINE POOL, bypassing standard authorization controls.

Threat Vectors:

Exploitation and Exposure

Immediate Actions: Patch, Harden, Monitor

1. Patch Immediately

Apply SAP’s August 2025 Security Notes (3627998 and 3633838, Patch Day August 11–12, 2025) to all affected systems

2. Restrict and Audit RFC Access

3. Monitor for Indicators of Compromise

4. Strengthen Defenses

Timeline

Conclusion

CVE-2025-42957 stands as one of the most severe SAP vulnerabilities in recent memory. With confirmed in-the-wild exploitation, businesses running SAP S/4HANA must treat this as a top emergency. Patch as quickly as possible and reinforce system monitoring and access controls immediately to avert business-altering compromise.

Exit mobile version