Fixes for 27 Flaws, Including 7 Critical

Fixes for 27 Flaws, Including 7 Critical

SAP released critical security updates on July 8, 2025, addressing 27 vulnerabilities across its enterprise software portfolio, with seven classified as critical-severity flaws.

The monthly Security Patch Day also included three updates to previously released security notes, underscoring the ongoing security challenges facing enterprise software environments.

The most severe vulnerability, CVE-2025-30012, affects SAP Supplier Relationship Management’s Live Auction Cockpit component and carries a maximum CVSS score of 10.0.

This critical flaw encompasses multiple vulnerabilities, including CVE-2025-30009, CVE-2025-30010, CVE-2025-30011, and CVE-2025-30018, potentially allowing attackers to gain complete system control.

CVE Product Priority CVSS Type
CVE-2025-30012 SAP Supplier Relationship Management Critical 10.0 Multiple vulnerabilities
CVE-2025-42967 SAP S/4HANA and SAP SCM Critical 9.1 Code Injection
CVE-2025-42980 SAP NetWeaver Enterprise Portal Critical 9.1 Insecure Deserialization
CVE-2025-42964 SAP NetWeaver Enterprise Portal Critical 9.1 Insecure Deserialization
CVE-2025-42966 SAP NetWeaver XML Data Archiving Critical 9.1 Insecure Deserialization
CVE-2025-42963 SAP NetWeaver Application Server Java Critical 9.1 Unsafe Deserialization
CVE-2025-42959 SAP NetWeaver ABAP Server High 8.1 Missing Authentication
CVE-2025-42953 SAP NetWeaver Application Server ABAP High 8.1 Missing Authorization
CVE-2024-53677 SAP Business Objects BI Platform High 8.0 Insecure File Operations
CVE-2025-42952 SAP Business Warehouse High 7.7 Missing Authorization
CVE-2025-42977 SAP NetWeaver Visual Composer High 7.6 Directory Traversal
CVE-2025-43001 SAPCAR Medium 6.9 Privilege Escalation
CVE-2025-42993 SAP S/4HANA Enterprise Event Medium 6.7 Missing Authorization
CVE-2025-42981 SAP NetWeaver Application Server ABAP Medium 6.1 Multiple vulnerabilities
CVE-2025-42969 SAP NetWeaver Application Server ABAP Medium 6.1 Cross-Site Scripting
CVE-2025-42962 SAP Business Warehouse Medium 6.1 Cross-Site Scripting
CVE-2025-42985 SAP BusinessObjects Content Administrator Medium 6.1 Open Redirect
CVE-2025-42970 SAPCAR Medium 5.8 Directory Traversal
CVE-2025-42979 SAP GUI for Windows Medium 5.6 Insecure Key Management
CVE-2025-42973 SAP Data Services Medium 5.4 Cross-Site Scripting
CVE-2025-42968 SAP NetWeaver RFC Medium 5.0 Missing Authorization
CVE-2025-42961 SAP NetWeaver Application Server ABAP Medium 4.9 Missing Authorization
CVE-2025-42960 SAP Business Warehouse BEx Tools Medium 4.3 Missing Authorization
CVE-2025-42986 SAP NetWeaver and ABAP Platform Medium 4.3 Missing Authorization
CVE-2025-42974 SAP NetWeaver and ABAP Platform Medium 4.3 Missing Authorization
CVE-2025-31326 SAP BusinessObjects BI Platform Medium 4.1 HTML Injection
CVE-2025-42965 SAP BusinessObjects BI Platform Medium 4.1 Server Side Request Forgery
CVE-2025-42971 SAPCAR Medium 4.0 Memory Corruption
CVE-2025-42978 SAP NetWeaver Application Server Java Low 3.5 Insecure Hostname Verification
CVE-2025-42954 SAP NetWeaver Business Warehouse Low 2.7 Denial of Service

Code injection and deserialization vulnerabilities dominate the critical category, with five additional flaws scoring 9.1 on the CVSS scale.

CVE-2025-42967 represents a code injection vulnerability in SAP S/4HANA and SAP SCM’s Characteristic Propagation component, affecting multiple versions across SCMAPO, S4CORE, S4COREOP, and SCM product lines.

The patches also address SAPCAR vulnerabilities, including privilege escalation (CVE-2025-43001), directory traversal (CVE-2025-42970), and memory corruption (CVE-2025-42971) issues in the SAP archive utility.

SAP strongly recommends immediate patching, particularly for critical vulnerabilities affecting internet-facing systems.

Organizations should prioritize updates based on their specific SAP landscape and exposure levels, with critical patches requiring urgent attention to prevent potential system compromise.

Stay Updated on Daily Cybersecurity News . Follow us on Google News, LinkedIn, and X.


Source link