Critical SAP Vulnerability Exposes Companies to Full Control by Hackers - Twodcompany

Critical SAP Vulnerability Exposes Companies to Full Control by Hackers

お知らせ

The SAP S/4HANA enterprise management system is crucial for managing key business functions, like finance, inventory, and logistics. It’s the operational “brain” of many companies.

Recently, a critical flaw in SAP has put companies at risk. The CVE-2025-42957 vulnerability allows hackers to take full control of the system and access sensitive data without authorization.

お知らせ

This flaw resides in SAP’s RFC (Remote Function Call) system. The vulnerability occurs because SAP doesn’t validate user permissions when processing remote functions. Hackers can exploit this to create admin accounts.

By creating unauthorized admin accounts, attackers can inject malicious code, such as ransomware and backdoors, into the system. This exposes the company to data theft, system manipulation, and operational disruption.

お知らせ

The consequences of exploiting this vulnerability are severe. Attackers can steal confidential data, alter records, and even shut down operations by installing malware like ransomware. This could lead to business paralysis.

How Hackers Exploit the Vulnerability in SAP

Hackers can exploit the vulnerability by creating admin accounts. This gives them unrestricted access to sensitive information, such as financial data, contracts, and client information.

Exploiting this flaw could result in the loss of control over the system. Attackers can also use ransomware to block access, extort companies, or manipulate data. The risk of permanent data breaches is high.

To successfully exploit the vulnerability, the attacker must have a valid SAP account. This could be a stolen, weak, or compromised account, often from employees, vendors, or partners with system access.

Although not entirely remote, this attack is dangerous due to the number of active accounts in SAP systems. The chance of exploitation is high in companies with many users and weak security practices.

The Impact of a Successful Attack

A successful attack can cause widespread damage to a company. This includes data theft, such as financial records, personal data, and business contracts. Altered records may damage the company’s reputation.

Privilege escalation is also a key risk. Hackers can escalate privileges by creating backdoor accounts. This allows them to control the system permanently, making recovery difficult.

Hackers can also install ransomware to lock the system. This leads to operational disruptions and could cause financial losses. Companies may be forced to pay to regain access to their own data.

Mitigating the Risk: How to Protect Your SAP System

To protect against this flaw, SAP recommends applying a security patch. This patch, released in August 2025, is the best solution to fix the vulnerability. Companies must act quickly to secure their systems.

While waiting for the patch, companies should take preventive steps. Use SAP UCON (Unified Connectivity) to limit who can use RFC functions. Monitoring user access can help prevent unauthorized privilege escalation.

Companies should also monitor user authorizations. Focus on sensitive objects like S_DMIS (activity 02) to detect suspicious actions. Auditing system logs for unusual activity can further reduce risk.

Revising system configurations is crucial. Ensure proper permission validation for all users and restrict access to only those with legitimate roles. These measures reduce the chances of exploitation.

The Role of SAP in Identifying the Vulnerability

The vulnerability was discovered by SecurityBridge and reported to SAP in June 2025. SAP classified the flaw as critical (CVSS 9.9 out of 10), recognizing its potential to disrupt business operations globally.

SAP actively collaborated with SecurityBridge to create the security patch. It was made available in August 2025. SAP also recommends companies apply the patch as soon as possible to avoid potential breaches.

Conclusion: Immediate Action Required

The CVE-2025-42957 vulnerability poses a serious threat to businesses relying on SAP S/4HANA. Companies should act quickly to apply the patch and implement preventive measures to protect their data and operations.

In addition to applying the patch, companies should consider cybersecurity best practices. Regular audits, multi-factor authentication, and staff training can help prevent future security incidents.

SEO Keywords: Critical SAP Flaw, CVE-2025-42957 Vulnerability, Full Control by Hackers, SAP S/4HANA, Cyberattack, SAP Security, SAP Security Patch, Business Security, Malicious Code Injection, Authorization Monitoring.

最新の出版物

法的言及

Twodcompanyは完全に独立したウェブサイトであり、サービスの承認や掲載に一切の費用を請求しておりません。編集者は情報の完全性と最新性を保証するために常に努力しておりますが、コンテンツが古くなっている場合があることをご了承ください。広告に関しては、ポータルに表示される内容は当社が一部管理しているため、第三者が提供するサービスや広告を通じて提供されるサービスについては責任を負いません。.