BusinessCybersecurityNewswireTechnology

Patch Now: Critical SAP S/4HANA Bug Actively Exploited

▼ Summary

– A critical code injection vulnerability (CVE-2025-42957) in SAP S/4HANA cloud is being actively exploited in the wild.
– The flaw has a CVSS score of 9.9 and allows attackers with low privileges to gain full system control.
– Exploitation enables admin-level access, OS interference, data theft, backdoor deployment, and operational disruption.
– No workarounds exist, and patching is essential but complex due to interconnected, customized SAP environments.
– Many organizations remain unpatched, highlighting challenges in applying timely security updates for critical systems.

Organizations relying on SAP S/4HANA cloud services are being urged to apply a critical security patch immediately, as a recently identified vulnerability is now under active exploitation. This high-severity flaw, designated as CVE-2025-42957, carries a CVSS score of 9.9 and could permit attackers with minimal user rights to seize complete administrative control over affected SAP environments.

Given that SAP S/4HANA often serves as the backbone for financial, logistical, and operational functions across numerous industries, a successful breach could inflict severe harm on businesses of all sizes. Jonathan Stross, a security analyst at Pathlock, emphasized that the system’s widespread adoption means virtually every major sector, from banking and manufacturing to healthcare and government, faces potential risk.

According to the vendor, exploitation of this vulnerability grants threat actors administrative privileges within the SAP system and may even allow interference at the operating system level. Such access opens the door to data theft, credential harvesting, backdoor installation, ransomware attacks, and significant operational disruption.

A National Vulnerability Database entry explains that the weakness lies in a function module accessible via RFC, where insufficient authorization checks enable the injection of arbitrary ABAP code. This effectively acts as a built-in backdoor, jeopardizing the confidentiality, integrity, and availability of the entire system.

The Dutch National Cyber Security Center has confirmed that active attacks are already occurring, despite the absence of a public exploit. SAP released the necessary patch on August 12, but many organizations have yet to implement it.

There are no available workarounds for this vulnerability, making prompt patching the only viable defense. Stross cautioned that the traditional one-month patching cycle is inadequate for threats of this magnitude. He noted that many companies remain exposed due to the challenges of updating complex, highly customized SAP landscapes that support essential business functions like finance, human resources, and supply chain management.

Each update must be rigorously tested across interconnected systems, a process that often delays critical security improvements.

(Source: Info Security)

Topics

sap vulnerability 98% cve-2025-42957 95% code injection 90% system compromise 88% security patching 87% enterprise impact 85% data theft 82% operational disruption 80% backdoor deployment 78% ransomware threat 75%

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.