Critical SAP Vulnerability Exposes Companies to Full Control by Hackers - Twodcompany

Une faille critique dans SAP expose les entreprises à un contrôle total par des pirates informatiques.

Annonces

Le système de gestion d'entreprise SAP S/4HANA est essentiel à la gestion des fonctions clés de l'entreprise, telles que la finance, les stocks et la logistique. Il constitue le “ cerveau ” opérationnel de nombreuses entreprises.

Recently, a critical flaw in SAP has put companies at risk. The CVE-2025-42957 vulnerability allows hackers to take full control of the system and access sensitive data without authorization.

Annonces

This flaw resides in SAP’s RFC (Remote Function Call) system. The vulnerability occurs because SAP doesn’t validate user permissions when processing remote functions. Hackers can exploit this to create admin accounts.

By creating unauthorized admin accounts, attackers can inject malicious code, such as ransomware and backdoors, into the system. This exposes the company to data theft, system manipulation, and operational disruption.

Annonces

The consequences of exploiting this vulnerability are severe. Attackers can steal confidential data, alter records, and even shut down operations by installing malware like ransomware. This could lead to business paralysis.

How Hackers Exploit the Vulnerability in SAP

Hackers can exploit the vulnerability by creating admin accounts. This gives them unrestricted access to sensitive information, such as financial data, contracts, and client information.

Exploiting this flaw could result in the loss of control over the system. Attackers can also use ransomware to block access, extort companies, or manipulate data. The risk of permanent data breaches is high.

To successfully exploit the vulnerability, the attacker must have a valid SAP account. This could be a stolen, weak, or compromised account, often from employees, vendors, or partners with system access.

Although not entirely remote, this attack is dangerous due to the number of active accounts in SAP systems. The chance of exploitation is high in companies with many users and weak security practices.

The Impact of a Successful Attack

A successful attack can cause widespread damage to a company. This includes data theft, such as financial records, personal data, and business contracts. Altered records may damage the company’s reputation.

Privilege escalation is also a key risk. Hackers can escalate privileges by creating backdoor accounts. This allows them to control the system permanently, making recovery difficult.

Hackers can also install ransomware to lock the system. This leads to operational disruptions and could cause financial losses. Companies may be forced to pay to regain access to their own data.

Mitigating the Risk: How to Protect Your SAP System

To protect against this flaw, SAP recommends applying a security patch. This patch, released in August 2025, is the best solution to fix the vulnerability. Companies must act quickly to secure their systems.

While waiting for the patch, companies should take preventive steps. Use SAP UCON (Unified Connectivity) to limit who can use RFC functions. Monitoring user access can help prevent unauthorized privilege escalation.

Companies should also monitor user authorizations. Focus on sensitive objects like S_DMIS (activity 02) to detect suspicious actions. Auditing system logs for unusual activity can further reduce risk.

Revising system configurations is crucial. Ensure proper permission validation for all users and restrict access to only those with legitimate roles. These measures reduce the chances of exploitation.

The Role of SAP in Identifying the Vulnerability

The vulnerability was discovered by SecurityBridge and reported to SAP in June 2025. SAP classified the flaw as critical (CVSS 9.9 out of 10), recognizing its potential to disrupt business operations globally.

SAP actively collaborated with SecurityBridge to create the security patch. It was made available in August 2025. SAP also recommends companies apply the patch as soon as possible to avoid potential breaches.

Conclusion: Immediate Action Required

The CVE-2025-42957 vulnerability poses a serious threat to businesses relying on SAP S/4HANA. Companies should act quickly to apply the patch and implement preventive measures to protect their data and operations.

In addition to applying the patch, companies should consider cybersecurity best practices. Regular audits, multi-factor authentication, and staff training can help prevent future security incidents.

SEO Keywords: Critical SAP Flaw, CVE-2025-42957 Vulnerability, Full Control by Hackers, SAP S/4HANA, Cyberattack, SAP Security, SAP Security Patch, Business Security, Malicious Code Injection, Authorization Monitoring.

Dernières publications

Mentions légales

Nous tenons à vous informer que Twodcompany est un site web totalement indépendant qui ne requiert aucun paiement pour l'approbation ou la publication de ses services. Bien que nos rédacteurs s'efforcent constamment de garantir l'intégrité et la mise à jour des informations, il est possible que notre contenu soit parfois obsolète. Concernant la publicité, nous n'exerçons qu'un contrôle partiel sur les publicités affichées sur notre portail ; par conséquent, nous ne sommes pas responsables des services fournis par des tiers et proposés par le biais de ces publicités.