Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

TechCrunch Mobility: An acquisition that may not be hostile

Whitehouse is already one of the most blocked accounts on Bluesky

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Publication of Chains sap defects publishes unreceived systems to remote code execution
Identity

Publication of Chains sap defects publishes unreceived systems to remote code execution

userBy userAugust 19, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 19, 2025Ravi LakshmananVulnerability/Cyberspy

A new exploit combines two important, currently patched security flaws from SAP NetWeaver, emerging in the wild, with organizations taking the risk of system compromise and data theft.

The exploit in question would chain CVE-2025-31324 and CVE-2025-42999 together to bypass authentication and enable remote code execution, SAP security company Onapsis said.

CVE-2025-31324 (CVSS score: 10.0) – Missing authorization check for Visual Composer Development Server CVE-2025-42999 (CVSS score: 9.1) for SAP NetWeaver

The vulnerability was addressed by SAP in April and May 2025, but not before being abused as zero-day by threat actors at least since March.

Cybersecurity

Several ransomware and data terr groups, including Qilin, Bianlian and Ransomexx, have been observed to weaponize flaws, not to mention Chinese and Nexus spyers who also use them in attacks targeting critical infrastructure networks.

The existence of exploits was first reported last week by VX-Underground. It said it was released by the scattered Lapsus $Hunters, a new fluid alliance formed by scattered spiders and Shiny Hunters.

“These vulnerabilities allow uncertified attackers to execute arbitrary commands on the target SAP system, including uploading any file,” Onapsis said. “This could lead to remote code execution (RCE) and complete acquisition of business data and processes for affected systems and SAP.”

According to the company, exploits can not only be used for web shell deployments, but can also be weaponized to carry out stay (LOTL) attacks by directly executing operating system commands without dropping additional artifacts on compromised systems. These commands are run with SAP administrator privileges and granted to bad actors who allow unauthorized access to SAP data and system resources.

Specifically, the attack chain first uses CVE-2025-31324 to avoid authentication and uploads the malicious payload to the server. It then exploits the Deserialization vulnerability (CVE-2025-42999) to unpack the payload and execute it with increased permissions.

“The publication of this escape gadget is particularly concerned due to the fact that it can be reused in other contexts, such as taking advantage of the escape vulnerability recently patched by SAP in July,” warned Onapsis.

Identity Security Risk Assessment

This is –

Describing threat actors as having extensive knowledge of SAP applications, the company encourages SAP users to apply the latest fixes as quickly as possible, to see and restrict access to SAP applications from the Internet, and to monitor SAP applications for signs of compromise.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNvidia is said to be developing new, more powerful AI chips for sale in China
Next Article CPG Startup Keychain robbes $30 million to build in India and grows in the US
user
  • Website

Related Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

TechCrunch Mobility: An acquisition that may not be hostile

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.