Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Pixel 10, new Gemini features, Pixel Watch, and everything else announced at the Made by Google 2025 event

DOM-based extension ClickJacking exposes popular password managers to credentials and data theft

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Publication of Chains sap defects publishes unreceived systems to remote code execution
Identity

Publication of Chains sap defects publishes unreceived systems to remote code execution

userBy userAugust 19, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 19, 2025Ravi LakshmananVulnerability/Cyberspy

A new exploit combines two important, currently patched security flaws from SAP NetWeaver, emerging in the wild, with organizations taking the risk of system compromise and data theft.

The exploit in question would chain CVE-2025-31324 and CVE-2025-42999 together to bypass authentication and enable remote code execution, SAP security company Onapsis said.

CVE-2025-31324 (CVSS score: 10.0) – Missing authorization check for Visual Composer Development Server CVE-2025-42999 (CVSS score: 9.1) for SAP NetWeaver

The vulnerability was addressed by SAP in April and May 2025, but not before being abused as zero-day by threat actors at least since March.

Cybersecurity

Several ransomware and data terr groups, including Qilin, Bianlian and Ransomexx, have been observed to weaponize flaws, not to mention Chinese and Nexus spyers who also use them in attacks targeting critical infrastructure networks.

The existence of exploits was first reported last week by VX-Underground. It said it was released by the scattered Lapsus $Hunters, a new fluid alliance formed by scattered spiders and Shiny Hunters.

“These vulnerabilities allow uncertified attackers to execute arbitrary commands on the target SAP system, including uploading any file,” Onapsis said. “This could lead to remote code execution (RCE) and complete acquisition of business data and processes for affected systems and SAP.”

According to the company, exploits can not only be used for web shell deployments, but can also be weaponized to carry out stay (LOTL) attacks by directly executing operating system commands without dropping additional artifacts on compromised systems. These commands are run with SAP administrator privileges and granted to bad actors who allow unauthorized access to SAP data and system resources.

Specifically, the attack chain first uses CVE-2025-31324 to avoid authentication and uploads the malicious payload to the server. It then exploits the Deserialization vulnerability (CVE-2025-42999) to unpack the payload and execute it with increased permissions.

“The publication of this escape gadget is particularly concerned due to the fact that it can be reused in other contexts, such as taking advantage of the escape vulnerability recently patched by SAP in July,” warned Onapsis.

Identity Security Risk Assessment

This is –

Describing threat actors as having extensive knowledge of SAP applications, the company encourages SAP users to apply the latest fixes as quickly as possible, to see and restrict access to SAP applications from the Internet, and to monitor SAP applications for signs of compromise.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNvidia is said to be developing new, more powerful AI chips for sale in China
Next Article CPG Startup Keychain robbes $30 million to build in India and grows in the US
user
  • Website

Related Posts

DOM-based extension ClickJacking exposes popular password managers to credentials and data theft

August 20, 2025

FBI warns FSB-linked hackers exploiting Patchededed Cisco devices for Cyber Spionage

August 20, 2025

Experts have discovered that AI browsers can be tricked by ProsptFix exploits to run malicious hidden prompts

August 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Pixel 10, new Gemini features, Pixel Watch, and everything else announced at the Made by Google 2025 event

DOM-based extension ClickJacking exposes popular password managers to credentials and data theft

Google doubles AI Phones with Pixel 10 series

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.