Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA orders immediate patches of critical Sitecore vulnerabilities under aggressive exploitation

Scale AI’s previous CTO to launch an AI agent that can solve the biggest issues with big data

Tesla shareholders vote to invest in Musk’s AI startup Xai

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » SAP S/4HANA Critical Vulnerability CVE-2025-42957 was exploited in the wild
Identity

SAP S/4HANA Critical Vulnerability CVE-2025-42957 was exploited in the wild

userBy userSeptember 5, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 5th, 2025Ravi LakshmananVulnerability/Enterprise Security

Critical security vulnerabilities affecting SAP S/4HANA, the Enterprise Resource Planning (ERP) software, are subject to active exploitation in the wild.

Tracked Command Injection Vulnerability CVE-2025-42957 (CVSS score: 9.9) was revised by SAP as part of last month’s monthly update.

“SAP S/4HANA allows user privileged attackers to take advantage of vulnerabilities in function modules exposed via RFCs” as described in the NIST National Ulnerability Database (NVD) flaws. “This flaw allows any ABAP code to be injected into the system, allowing essential approval checks to be bypassed.

CIS Build Kit

A successful investigation of the defect can result in a complete system compromise in the SAP environment, which can suppress the confidentiality, integrity and availability of the system. In short, an attacker can modify the SAP database, create a superuser account using SAP_ALL privileges, download a password hash, and modify business processes.

SecurityBridge’s Threat Research Lab, Alerts It said that the issue was observed to have an aggressive exploitation of flaws, published Thursday, stating that the issue would affect both on-premises and private cloud editions.

“Exploitation requires access to only modest users to completely compromise the SAP system,” the company said. “The perfect system compromises with the minimum required effort. Successful exploitation can easily lead to fraud, data theft, spying, or ransomware installation.”

He also said that widespread exploitation has not yet been detected, but threat actors have the knowledge to use it, and that reverse engineering patches to create exploitation is “relatively easy.”

As a result, organizations are advised to apply patches as soon as possible, monitor the logs of suspicious RFC calls or new admin users, and ensure that they have proper segmentation and backups in place.

It also states, “We will consider implementing SAP UCON to restrict the use of RFCs and verify and restrict access to the authentication object S_DMIS activity 02.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUKEF funding for aviation professionals makes the industry more sustainable
Next Article Star formation revealed by Alma in the distant Milky Way region
user
  • Website

Related Posts

CISA orders immediate patches of critical Sitecore vulnerabilities under aggressive exploitation

September 5, 2025

Tag-150 develops Castle Rats in Python and C, expanding Castle Loader malware operations

September 5, 2025

Automation is redefineing pentest delivery

September 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA orders immediate patches of critical Sitecore vulnerabilities under aggressive exploitation

Scale AI’s previous CTO to launch an AI agent that can solve the biggest issues with big data

Tesla shareholders vote to invest in Musk’s AI startup Xai

Tag-150 develops Castle Rats in Python and C, expanding Castle Loader malware operations

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Beyond Compliance: The New Era of Smart Medical Device Software Integration

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.