Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Almost half of xAI’s founding team has now left the company.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Publication of Chains sap defects publishes unreceived systems to remote code execution
Identity

Publication of Chains sap defects publishes unreceived systems to remote code execution

userBy userAugust 19, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 19, 2025Ravi LakshmananVulnerability/Cyberspy

A new exploit combines two important, currently patched security flaws from SAP NetWeaver, emerging in the wild, with organizations taking the risk of system compromise and data theft.

The exploit in question would chain CVE-2025-31324 and CVE-2025-42999 together to bypass authentication and enable remote code execution, SAP security company Onapsis said.

CVE-2025-31324 (CVSS score: 10.0) – Missing authorization check for Visual Composer Development Server CVE-2025-42999 (CVSS score: 9.1) for SAP NetWeaver

The vulnerability was addressed by SAP in April and May 2025, but not before being abused as zero-day by threat actors at least since March.

Cybersecurity

Several ransomware and data terr groups, including Qilin, Bianlian and Ransomexx, have been observed to weaponize flaws, not to mention Chinese and Nexus spyers who also use them in attacks targeting critical infrastructure networks.

The existence of exploits was first reported last week by VX-Underground. It said it was released by the scattered Lapsus $Hunters, a new fluid alliance formed by scattered spiders and Shiny Hunters.

“These vulnerabilities allow uncertified attackers to execute arbitrary commands on the target SAP system, including uploading any file,” Onapsis said. “This could lead to remote code execution (RCE) and complete acquisition of business data and processes for affected systems and SAP.”

According to the company, exploits can not only be used for web shell deployments, but can also be weaponized to carry out stay (LOTL) attacks by directly executing operating system commands without dropping additional artifacts on compromised systems. These commands are run with SAP administrator privileges and granted to bad actors who allow unauthorized access to SAP data and system resources.

Specifically, the attack chain first uses CVE-2025-31324 to avoid authentication and uploads the malicious payload to the server. It then exploits the Deserialization vulnerability (CVE-2025-42999) to unpack the payload and execute it with increased permissions.

“The publication of this escape gadget is particularly concerned due to the fact that it can be reused in other contexts, such as taking advantage of the escape vulnerability recently patched by SAP in July,” warned Onapsis.

Identity Security Risk Assessment

This is –

Describing threat actors as having extensive knowledge of SAP applications, the company encourages SAP users to apply the latest fixes as quickly as possible, to see and restrict access to SAP applications from the Internet, and to monitor SAP applications for signs of compromise.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNvidia is said to be developing new, more powerful AI chips for sale in China
Next Article CPG Startup Keychain robbes $30 million to build in India and grows in the US
user
  • Website

Related Posts

North Korean agents impersonate experts on LinkedIn to infiltrate companies

February 10, 2026

Reynolds ransomware embeds BYOVD drivers that disable EDR security tools

February 10, 2026

Inside the rise of the digital parasite

February 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Almost half of xAI’s founding team has now left the company.

North Korean agents impersonate experts on LinkedIn to infiltrate companies

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.