PT-2025-36562 · Sap · Sap Netweaver
Published
2025-09-09
·
Updated
2025-10-16
·
CVE-2025-42944
CVSS v3.1
10
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
SAP NetWeaver versions 5.3 through 10.0
Description
The issue is an insecure deserialization flaw within the RMI-P4 module of SAP NetWeaver. This allows an unauthenticated attacker to submit malicious payloads to an open port, leading to arbitrary operating system command execution. The deserialization of untrusted Java objects is the root cause. It is estimated that over 515,000 systems are potentially exposed. The vulnerability has a CVSS score of 10.0, indicating critical severity. The API Endpoint involved is not explicitly specified, but the attack vector involves submitting payloads to an open port. The vulnerability leverages the deserialization process, potentially impacting functions related to object handling. The vulnerable component is the
RMI-P4
module.Recommendations
Apply SAP Note 3634501 to all affected versions.
Restrict or close the RMI-P4 module to minimize the risk of exploitation.
Segment networks to limit the potential impact of a successful attack.
Fix
RCE
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-10908
CVE-2025-42944
Affected Products
Sap Netweaver
References · 60
- https://bdu.fstec.ru/vul/2025-10908 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-42944 · Security Note
- https://twitter.com/DarkWebInformer/status/1976381058728984935 · Twitter Post
- https://reddit.com/r/ITManagers/comments/1ndektz/sap_warns_of_critical_vulnerabilities_in_s4hana · Reddit Post
- https://twitter.com/haseebgakhar/status/1978546099389387208 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1o3rs1g/top_10_trending_cves_11102025 · Reddit Post
- https://twitter.com/PurpleOps_io/status/1965408299131531539 · Twitter Post
- https://reddit.com/r/SecWiser/comments/1o73zfh/new_sap_netweaver_flaw_enables_remote_server · Reddit Post
- https://twitter.com/grok/status/1978647107402866688 · Twitter Post
- https://twitter.com/NandanLohitaksh/status/1978520795623174379 · Twitter Post
- https://twitter.com/catnap707/status/1965609481171337246 · Twitter Post
- https://twitter.com/spinidg/status/1978075622195826835 · Twitter Post
- https://t.me/pentestingnews/67773 · Telegram Post
- https://twitter.com/fridaysecurity/status/1965309681674715491 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1965432215438774359 · Twitter Post