CVE-2025-42957

SAP · SAP Multiple Products

A critical vulnerability has been identified in multiple SAP products, including S/4HANA.

Executive summary

A critical vulnerability has been identified in multiple SAP products, including S/4HANA. This flaw allows an authenticated user to inject and execute arbitrary code, potentially leading to a complete compromise of the affected SAP system. Due to the critical nature of this vulnerability and the central role of SAP systems in business operations, immediate remediation is required to prevent data theft, fraud, and significant business disruption.

Vulnerability

The vulnerability exists within a function module exposed via the Remote Function Call (RFC) interface in SAP S/4HANA and other products. An attacker who has already obtained standard user credentials can craft a malicious RFC request to this function module. This request injects arbitrary ABAP code, which is then executed by the system with high privileges, bypassing standard authorization checks and security mechanisms. This effectively allows a low-privileged user to escalate their privileges and gain full administrative control over the SAP application server.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.9, reflecting the extreme risk it poses to the organization. Successful exploitation could lead to a complete takeover of the SAP system, which often serves as the backbone for an organization's most critical functions. Potential consequences include unauthorized access to and exfiltration of sensitive data (e.g., financial records, customer PII, HR information), manipulation of financial transactions leading to fraud, and disruption of core business processes such as supply chain management, manufacturing, and finance. The impact extends beyond data confidentiality and integrity to system availability, potentially causing a complete operational shutdown.

Remediation

Immediate Action: The primary remediation is to apply the security patches provided by the vendor immediately. System administrators must identify the affected systems and update SAP Multiple Products to the latest secure version. Refer to the official SAP security advisory for this CVE to identify the specific patches required for your environment.

Proactive Monitoring: Implement enhanced monitoring for signs of attempted or successful exploitation. Security teams should closely review SAP security audit logs (e.g., SM20) for unusual or unauthorized RFC calls, particularly to the vulnerable function module. Monitor for unexpected user creations, privilege escalations, or the execution of suspicious ABAP reports.

Compensating Controls: If patching cannot be performed immediately, implement compensating controls to reduce the risk. Restrict network access to the RFC interface from untrusted segments. Use SAP's authorization objects (e.g., S_RFC) to strictly limit which users and systems can execute the vulnerable function module. If possible, disable the vulnerable function module entirely if it is not required for business operations.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Due to the critical severity (CVSS 9.9) of this vulnerability, we recommend treating its remediation as the highest priority. The ability for an attacker with only standard user access to gain full control of a core SAP system presents an unacceptable level of risk. Organizations must immediately initiate their patch management process to apply the vendor-supplied updates. While the vulnerability is not yet known to be actively exploited in the wild, its severity makes it a prime target for future attacks. All compensating controls should be implemented without delay on systems where patching is not immediately feasible.