CVE-2025-42951

SAP · SAP Business One (System Landscape Directory - SLD)

A high-severity vulnerability has been identified in SAP Business One's System Landscape Directory (SLD) component.

Executive summary

A high-severity vulnerability has been identified in SAP Business One's System Landscape Directory (SLD) component. This flaw, resulting from broken authorization checks, allows an attacker who is already authenticated to the system to escalate their privileges to a database administrator. Successful exploitation could grant the attacker complete control over the business database, leading to potential data theft, fraud, or significant operational disruption.

Vulnerability

The vulnerability exists within an API endpoint of the SAP Business One System Landscape Directory (SLD). The system fails to properly enforce authorization checks when certain API functions are called. An attacker with valid, but potentially low-level, user credentials can craft and send a malicious request to this API. By invoking the vulnerable function, the attacker can bypass standard security controls and grant their account, or an account they control, full administrator privileges on the underlying database.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation could have severe consequences for the business, granting an attacker complete control over the SAP Business One database. This level of access could lead to the theft of sensitive financial data, customer information, and intellectual property; manipulation of financial records for fraudulent purposes; and disruption of critical business operations by deleting or corrupting data. The compromise of such a core system poses a significant risk to the organization's financial stability, regulatory compliance, and reputation.

Remediation

Immediate Action: Apply the security updates released by the vendor immediately to all affected SAP Business One instances. After patching, review system and database access logs for any signs of unauthorized privilege escalation or unusual administrative activity that may have occurred prior to remediation.

Proactive Monitoring: Monitor API access logs for unusual or repeated calls to the SLD component, especially from non-administrative user accounts. Implement and review database audit logs, specifically looking for unexpected creation of new administrative users or modifications to user privileges.

Compensating Controls: If patching is not immediately possible, restrict network access to the SLD API to only trusted administrative workstations. A Web Application Firewall (WAF) can be configured to block or alert on suspicious requests targeting the vulnerable API endpoint. Enforce the principle of least privilege for all application user accounts to limit the initial attack surface.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the critical role of SAP Business One in core business functions, this vulnerability represents a significant risk to the organization. We strongly recommend that the vendor-supplied security updates be applied as an immediate priority across all affected systems. While this CVE is not currently listed on the CISA KEV catalog and there are no public exploits, the severity of the flaw makes it a prime target for threat actors. If immediate patching is not feasible, implement the suggested compensating controls and enhance monitoring to detect and respond to any potential exploitation attempts.