{"id":13596,"date":"2025-09-11T09:28:19","date_gmt":"2025-09-11T07:28:19","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=13596"},"modified":"2025-09-11T09:28:19","modified_gmt":"2025-09-11T07:28:19","slug":"sap-security-notes-september-2025","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/","title":{"rendered":"SAP Security Notes, September 2025"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<h2>September 2025 Notes<\/h2>\n<h3>Monthly Summary and Highlights<\/h3>\n<div>\n<div class=\"elementToProof\">This month the total number has been 21 notes, 2 more than in the previous month. This month we had 4 Hot News, 1 more than in the previous period. Regarding high-criticality notes, there are 4, which is 2 more than the previous month. Medium and low notes will not be reviewed, so <b>we will provide details on a total of 8 notes<\/b> (all those with a CVSS of <b>7 <\/b>or higher).<\/div>\n<div><\/div>\n<div class=\"elementToProof\">\n<p>We have <b>a total of 21 notes<\/b> for the whole month (17 new and 4 updates of notes published in previous months).<\/p>\n<p>We will review in detail a total of 5 notes, all of high criticality and Hot News:<\/p>\n<ol start=\"1\">\n<li>\n<div role=\"presentation\"><b>The highest criticality note of the month (CVSS<\/b><b> <\/b><span style=\"color: #ff0000;\"><b>10<\/b><\/span><b>) <\/b>is the Hot News with the maximum criticality score. This new note is related to <b>\u201cInsecure Deserialization vulnerability in SAP Netweaver (RMI-P4)&#8221;<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\">The next in criticality <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>9.9<\/b><\/span><b>)<\/b> is the following Hot News related to <b>\u201cInsecure File Operations vulnerability in SAP NetWeaver AS Java (Deploy Web Service)\u201d<\/b>.<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">The next in criticality <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>9.6<\/b><\/span><b>) <\/b>is the third Hot News of the month, and it is an update of one published in March 2023. It is related to &#8220;<b>Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform<\/b>&#8220;<\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">The next note in criticality <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>9.1<\/b><\/span><b>) <\/b>is the last Hot News of the period, and it is related to &#8220;<b>Missing Authentication check in SAP NetWeaver<\/b>&#8220;<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">The next note in criticality <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>8.8<\/b><\/span><b>)<\/b> is the first high-criticality note, and it is related to <b>\u201cInsecure Storage of Sensitive Information in SAP Business One (SLD)\u201d<\/b>.<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">The next note in criticality <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>8.1<\/b><\/span><b>) <\/b>is related to <b>\u201cMissing input validation vulnerability in SAP Landscape Transformation Replication Server\u201d<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\">The next note in criticality <b>(CVSS <\/b><span style=\"color: #ff0000;\"><b>8.1<\/b><\/span><b>) <\/b>is related to <b>\u201cMissing input validation vulnerability in SAP S\/4HANA (Private Cloud or On-Premise)\u201d<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\">Finally, the last note we are going to analyze, with a criticality of <b>(CVSS <\/b><span style=\"color: #ff9900;\"><b>7.7<\/b><\/span><b>) <\/b>is an update of a note released in April this year, and it is related to <b>\u201cDirectory Traversal vulnerability in SAP NetWeaver and ABAP Platform (Service Data Collection)\u201d<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\">This month the most predominant type is <b>\u201cMissing Authorization Check\u201d (8\/21 on patch day)<\/b>.<\/div>\n<\/li>\n<\/ol>\n<p>In the chart we can see the <b><u>classification of the September notes<\/u><\/b>, as well as the trend and classification of the previous 5 months (only the Sec. Tuesday \/ Patch Day notes \u2013 by SAP):<\/p>\n<\/div>\n<\/div>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-13597\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/09\/notas-sap-septiembre-2025.jpg\" alt=\"\" width=\"799\" height=\"420\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/09\/notas-sap-septiembre-2025.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/09\/notas-sap-septiembre-2025-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/09\/notas-sap-septiembre-2025-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/09\/notas-sap-septiembre-2025-600x315.jpg 600w\" sizes=\"(max-width: 799px) 100vw, 799px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol start=\"1\">\n<li>\n<div role=\"presentation\"><b>Insecure Deserialization vulnerability in SAP Netweaver (RMI-P4)<\/b><b> <u>(<\/u><\/b><b><a id=\"OWAf2d844a2-7d76-2008-bd59-e7b097cfda60\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3634501\" data-auth=\"NotApplicable\">3634501<\/a><\/b><b><u>)<\/u>:<\/b>\u00a0In SAP NetWeaver, an unauthenticated attacker could exploit a deserialization vulnerability in the RMI-P4 module by sending malicious payloads to an open port. This insecure deserialization of untrusted Java objects could allow arbitrary OS command execution, severely impacting confidentiality, integrity, and availability. SAP resolved the issue by updating the affected P4-Lib component to enforce secure deserialization and restrict untrusted object acceptance. Customers must implement the patches specified in the note, ensuring that the JVM version is greater than Java 8 u121, and review dependency guidance to avoid incompatibilities. If patches cannot be applied immediately, administrators can mitigate risk by filtering the P4 port at the ICM level, allowing only trusted hosts and blocking all others. This workaround should only be used temporarily until the official fix is applied, after which it can be rolled back.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>10<\/b><\/span><b>\/ 10 <\/b><b>[<a id=\"OWAa1a62cd4-a231-d3a8-99dd-74098010673e\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42944\" data-auth=\"NotApplicable\">CVE-2025-42944<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Insecure File Operations vulnerability in SAP NetWeaver AS Java (Deploy Web Service)<\/b><b><u>(<\/u><\/b><b><a id=\"OWA71c3a58c-545e-d8c3-0e19-7aa8f3694d36\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3643865\" data-auth=\"NotApplicable\">3643865<\/a><\/b><b><u>)<\/u>:<\/b>\u00a0In SAP NetWeaver AS Java, an attacker authenticated as a non-administrative user could exploit a flaw in an available service to upload arbitrary files, which if executed could result in full system compromise, affecting confidentiality, integrity, and availability. SAP resolved this issue by restricting access to the vulnerable web service exclusively to administrative users. A temporary workaround is available and described in KBA 3646072. It should only be used if patches cannot be immediately applied and must be assessed for applicability to the specific SAP landscape. SAP strongly recommends applying the permanent fix as soon as possible. <b>CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>9,9<\/b><\/span><b>\/ 10 <\/b> <b>[<a id=\"OWAef5e9f6f-cc35-87e3-7af1-09aa672381f1\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42922\" data-auth=\"NotApplicable\">CVE-2025-42922<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform <\/b>(update)<b>\u00a0(<\/b><b><a id=\"OWA00b2064e-aead-0e8e-efb3-628fb7e2de42\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3302162\" data-auth=\"NotApplicable\">3302162<\/a><\/b><b>): <\/b>In SAP, a directory traversal vulnerability in program SAPRSBRO\u00a0allows an attacker with non-administrative authorizations to overwrite system files. While no data can be read, critical OS files may be replaced, leading to system unavailability. In the current version (v11, 9th September 2025), the note was re-released with updated Correction Instruction information.\u00a0To resolve the issue, customers must implement the referenced Support Package or apply the attached coding corrections, which disable execution of the vulnerable program. For further details, SAP Note 3311360 provides additional guidance.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>9,6<\/b><\/span><b>\/ 10\u00a0 <\/b><b>[<a id=\"OWAeefe84c0-9be2-5e15-75b9-9a0885c77725\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-27500\" data-auth=\"NotApplicable\">CVE-2023-27500<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>\u00a0<\/b><b>Missing Authentication check in SAP NetWeaver<\/b><b>\u00a0(<\/b><b><a id=\"OWA58d8a0b2-902b-ed73-2aba-a1d68836cda3\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3627373\" data-auth=\"NotApplicable\">3627373<\/a><\/b><b>): <\/b>In SAP NetWeaver on IBM i-series, a missing authentication check allows highly privileged unauthorized users to read, modify, or delete sensitive information, as well as access administrative functions, severely impacting confidentiality, integrity, and availability. Systems are affected when multiple SAP system IDs (SIDs) are configured in one logical partition (LPAR). SAP resolved the issue by enforcing proper access restrictions and limiting SAP user profile rights. The fix is delivered via updated kernel patch levels (hotfix <code>ILE.SAR<\/code>\u00a0or SP Stack Kernel files <code>SAPEXE.SAR<\/code>\u00a0and <code>SAPEXEDB.SAR<\/code>). Customers should apply the latest available SP Stack Kernel or hotfix as recommended in the note and related kernel guidance.\u00a0No workaround is available; applying the kernel patch is mandatory.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>9,1<\/b><\/span><b>\/ 10 <\/b><b>[<a id=\"OWAa4890a7f-93b9-8a49-77a5-fc00c85fd589\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42958\" data-auth=\"NotApplicable\">CVE-2025-42958<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Insecure Storage of Sensitive Information in SAP Business One (SLD)<\/b><b>\u00a0(<\/b><b><a id=\"OWA512f8467-f54f-36c7-3965-ec2bc9487fb0\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3642961\" data-auth=\"NotApplicable\">3642961<\/a><\/b><b>): <\/b>In SAP Business One, when a user logs in via the native client, the SLD backend service failed to properly encrypt certain APIs, resulting in exposure of sensitive credentials in the HTTP response body. This flaw could compromise confidentiality, integrity, and availability of the application. SAP fixed the issue by enhancing the SLD service logic to securely encrypt the database password in responses. Customers must implement the referenced Support Packages and Patches to mitigate the risk. There is no workaround.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>8,8<\/b><\/span><b>\/ 10\u00a0 <\/b><b>[<a id=\"OWA4ddf7549-b7ef-cf5c-2276-bdfdd75562d5\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42933\" data-auth=\"NotApplicable\">CVE-2025-42933<\/a>]<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Missing input validation vulnerability in SAP Landscape Transformation Replication Server (<\/b><b><a id=\"OWAbae7303f-0f46-bc88-397d-913f0335d26d\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3633002\" data-auth=\"NotApplicable\">3633002<\/a><\/b><b>): <\/b>In SAP, missing input validation allows an attacker with high privilege access to ABAP reports to delete the content of arbitrary database tables if they are not protected by an authorization group. This vulnerability severely impacts database integrity and availability. SAP resolved the issue by removing obsolete and outdated code. Customers must apply the <i>Correction Instructions<\/i>\u00a0or <i>Support Packages<\/i>\u00a0referenced in the note. <b>CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>8,1<\/b><\/span><b>\/ 10\u00a0 [<a id=\"OWAa1594ea1-828d-c026-03ba-e8f9da076419\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42929\" data-auth=\"NotApplicable\">CVE-2025-42929<\/a>]<\/b><\/div>\n<div role=\"presentation\"><b>\u00a0<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Missing input validation vulnerability in SAP S\/4HANA (Private Cloud or On-Premise) (<\/b><b><a id=\"OWAeeca9184-d280-bf72-2a10-a0ace95db7cc\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3635475\" data-auth=\"NotApplicable\">3635475<\/a><\/b><b>): <\/b>In SAP, missing input validation in ABAP reports allows an attacker with high privilege access to delete the content of arbitrary database tables that are not protected by an authorization group. This vulnerability affects database integrity and availability, though confidentiality is not impacted. SAP resolved the issue by removing obsolete and outdated code. Customers must apply the <i>Correction Instructions<\/i>\u00a0or <i>Support Packages<\/i>\u00a0specified in the note.\u00a0No workaround is available; the official fix must be applied. <b>CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>8,1<\/b><\/span><b>\/ 10\u00a0 [<a id=\"OWA79d9bdd8-b8bd-9c10-0124-f3c767c9f848\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42916\" data-auth=\"NotApplicable\">CVE-2025-42916<\/a>]<\/b><\/div>\n<div role=\"presentation\"><b>\u00a0<\/b><\/div>\n<\/li>\n<li>\n<div role=\"presentation\"><b>Directory Traversal vulnerability in SAP NetWeaver and ABAP Platform (Service Data Collection) <\/b>(update)<b>\u00a0(<\/b><b><a id=\"OWAb692d64f-f442-8e2b-349e-87e5830802a0\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/me.sap.com\/notes\/3581811\" data-auth=\"NotApplicable\">3581811<\/a><\/b><b>):<\/b>\u00a0In SAP Solution Manager, a directory traversal vulnerability in an RFC-enabled function module allows an authorized attacker to read files from any managed system, potentially exposing critical information and impacting confidentiality, though integrity and availability are unaffected. In the current version (v8, 9th September 2025), the note was re-released with updated Correction Instructions.\u00a0SAP fixed the issue by enforcing proper path checks in the Service Data Collection function module to prevent arbitrary file reads. Customers must implement the referenced <i>Correction Instructions<\/i>\u00a0or <i>Support Packages<\/i>. No workaround is available; applying the correction is required. <b>CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff9900;\"><b>7,7<\/b><\/span><b>\/ 10\u00a0 [<a id=\"OWA6c4a9e84-f334-ee6b-3b44-4d9fe6ca9707\" class=\"x_OWAAutoLink x_elementToProof\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-27428\" data-auth=\"NotApplicable\">CVE-2025-27428<\/a>]<\/b><\/div>\n<\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (september):<\/p>\n<p><b><a id=\"OWAc04a2e39-ef3d-d6d7-3b91-bd3d8efeb1a9\" class=\"x_OWAAutoLink\" title=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/september-2025.html\" href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/september-2025.html\" data-auth=\"NotApplicable\">SAP Security Patch Day &#8211; September 2025<\/a><\/b><\/p>\n<p><b><a id=\"OWAae38a5db-6bb8-b132-68a7-4258b1fb4726\" class=\"x_OWAAutoLink\" title=\"https:\/\/onapsis.com\/blog\/sap-security-notes-september-2025-patch-day\/\" href=\"https:\/\/onapsis.com\/blog\/sap-security-notes-september-2025-patch-day\/\" data-auth=\"NotApplicable\">SAP Patch Day: September 2025 &#8211; Onapsis<\/a><\/b><\/p>\n<p>&nbsp;<\/p>\n<p><strong style=\"color: #014888; font-family: inherit; font-size: 1.6rem; letter-spacing: 0em;\"><u>Resources affected<\/u><\/strong><\/p>\n<div class=\"w-post-elm post_content\">\n<p>The full list of affected systems\/components is as follows:<\/p>\n<div><b>SAP NetWeaver<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">RMI-P4: SERVERCORE 7.50<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">Application Server Java (Deploy Web Service): J2EE-APPS 7.50<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">AS for ABAP and ABAP Platform: 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">ABAP Platform \/ Service Data Collection: ST-PI 2008_1_700, 2008_1_710, 740<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">Application Server Java (IIOP Service): SERVERCORE 7.50<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">Application Server Java: WD-RUNTIME 7.50<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">Service Data Download: SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816<\/div>\n<\/li>\n<\/ul>\n<div><b>SAP Business One (SLD)<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">B1_ON_HANA 10.0, SAP-M-BO 10.0<\/div>\n<\/li>\n<\/ul>\n<div><b>SAP Landscape Transformation<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">Replication Server: DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020<\/div>\n<\/li>\n<\/ul>\n<div><b>SAP S\/4HANA (Private Cloud or On-Premise)<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">S4CORE 102, 103, 104, 105, 106, 107, 108<\/div>\n<\/li>\n<\/ul>\n<div><b>SAP Business Planning and Consolidation (BPC)<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">BPC4HANA 200, 300, SAP_BW 750\u2013758, 816, 914, CPMBPC 810<\/div>\n<\/li>\n<\/ul>\n<div><b>SAP HCM (Fiori apps)<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">My Timesheet \/ Approve Timesheets Fiori 2.0: GBX01HR5 605<\/div>\n<\/li>\n<\/ul>\n<div><b>SAP BusinessObjects Business Intelligence Platform<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">ENTERPRISE 430, 2025, 2027<\/div>\n<\/li>\n<\/ul>\n<div><b>SAP Supplier Relationship Management (SRM)<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">SRM_SERVER 700, 701, 702, 713, 714<\/div>\n<\/li>\n<\/ul>\n<div><b>SAP NetWeaver ABAP Platform<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">S4CRM 100, 200, 204, 205, 206; S4CEXT 109; BBPCRM 713, 714<\/div>\n<\/li>\n<\/ul>\n<div><b>SAP Fiori Apps<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">Manage Payment Blocks: S4CORE 107, 108<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">F4044 Manage Work Center Groups: UIS4HOP1 600, 700, 800, 900<\/div>\n<\/li>\n<li>\n<div role=\"presentation\">Launchpad: SAP_UI 754<\/div>\n<\/li>\n<\/ul>\n<div><b>SAP Commerce Cloud \/ SAP Datahub<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">HY_COM 2205, HY_DHUB 2205, COM_CLOUD 2211, DHUB_CLOUD 2211<\/div>\n<\/li>\n<\/ul>\n<div><b>SAP NetWeaver AS Java (Adobe Document Service)<\/b><\/div>\n<ul data-editing-info=\"{&quot;applyListStyleFromLevel&quot;:true}\">\n<li>\n<div role=\"presentation\">ADSSAP 7.50<\/div>\n<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. September 2025 Notes Monthly Summary and Highlights This month the total number has been 21 notes, 2 more than in the previous month. This month we had 4 Hot News, 1 more than&#8230;<\/p>\n","protected":false},"author":6,"featured_media":13598,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[150],"class_list":["post-13596","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2","tag-sap-notes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, September 2025 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from september 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, September 2025\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from september 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-11T07:28:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/09\/notas-sap-septiembre-2025.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, September 2025\",\"datePublished\":\"2025-09-11T07:28:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/\"},\"wordCount\":1464,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/notas-sap-septiembre-2025.jpg\",\"keywords\":[\"SAP Notes\"],\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/\",\"name\":\"SAP Security Notes, September 2025 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/notas-sap-septiembre-2025.jpg\",\"datePublished\":\"2025-09-11T07:28:19+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from september 2025, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/notas-sap-septiembre-2025.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/notas-sap-septiembre-2025.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, September 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, September 2025 - Inprosec","description":"All updates to SAP systems notes from september 2025, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, September 2025","og_description":"All updates to SAP systems notes from september 2025, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/","og_site_name":"Inprosec","article_published_time":"2025-09-11T07:28:19+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/09\/notas-sap-septiembre-2025.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, September 2025","datePublished":"2025-09-11T07:28:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/"},"wordCount":1464,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/09\/notas-sap-septiembre-2025.jpg","keywords":["SAP Notes"],"articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/","name":"SAP Security Notes, September 2025 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/09\/notas-sap-septiembre-2025.jpg","datePublished":"2025-09-11T07:28:19+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from september 2025, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/09\/notas-sap-septiembre-2025.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/09\/notas-sap-septiembre-2025.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, September 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=13596"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13596\/revisions"}],"predecessor-version":[{"id":13600,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13596\/revisions\/13600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/13598"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=13596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=13596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=13596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}