Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Redefining architecture through Engineered Living Materials

Hydrogen Valley at the innovation center of the North Adriatic Sea

Two CVSS 10.0 bugs in Red Lion RTU could allow hackers to gain complete industrial control

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New bug in SAP NetWeaver allows attackers to take over servers without logging in
Identity

New bug in SAP NetWeaver allows attackers to take over servers without logging in

userBy userOctober 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 15, 2025Ravi Lakshmanan Enterprise software/vulnerabilities

SAP has published security fixes for 13 new security issues, including additional hardening for a maximum severity bug in SAP NetWeaver AS Java that could lead to arbitrary command execution.

This vulnerability is tracked as CVE-2025-42944 and has a CVSS score of 10.0. This is described as a case of unsafe deserialization.

According to the flag description on CVE.org, “A deserialization vulnerability in SAP NetWeaver could allow an unauthenticated attacker to exploit the system via the RMI-P4 module by sending a malicious payload to an open port.”

DFIR retainer service

“Such untrusted deserialization of Java objects can lead to the execution of arbitrary OS commands, significantly impacting application confidentiality, integrity, and availability.”

The vulnerability was first addressed by SAP last month, but security firm Onapsis said the latest fix provides additional safeguards against the risks posed by deserialization.

“An additional layer of protection is based on the implementation of a JVM-wide filter (jdk.serialFilter) that prevents deserialization of proprietary classes,” the paper said. “The list of recommended classes and packages to block has been defined in collaboration with ORL and is divided into required and optional sections.”

Another critical vulnerability to note is CVE-2025-42937 (CVSS score: 9.8). This is a directory traversal flaw in SAP Print Services, resulting from insufficient path validation, which could allow an unauthenticated attacker to reach the parent directory and overwrite system files.

The third critical flaw patched by SAP concerns the SAP Supplier Relationship Management unrestricted file upload bug (CVE-2025-42910, CVSS score: 9.0), which could allow an attacker to upload arbitrary files, including malicious executables, that could affect the confidentiality, integrity, and availability of the application.

CIS build kit

Although there is no evidence that these flaws have been exploited in the wild, it is important that users apply the latest patches and mitigations as soon as possible to avoid potential threats.

Pathlock’s Jonathan Stross said, “Deserialization remains a big risk.” “The P4/RMI chain remains at significant risk in AS Java, and SAP has issued both direct fixes and hardened JVM configurations to reduce exploits of the gadget class.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCoinbase expands investment in India’s CoinDCX, with exchange value of $2.45 billion
Next Article OpenAI will take 5 years to turn $13 billion into $1 trillion
user
  • Website

Related Posts

Two CVSS 10.0 bugs in Red Lion RTU could allow hackers to gain complete industrial control

October 15, 2025

Hackers exploit cookies to target ICTBroadcast servers and gain remote shell access

October 15, 2025

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Redefining architecture through Engineered Living Materials

Hydrogen Valley at the innovation center of the North Adriatic Sea

Two CVSS 10.0 bugs in Red Lion RTU could allow hackers to gain complete industrial control

Hackers exploit cookies to target ICTBroadcast servers and gain remote shell access

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.