Inprosec a través de sus servicios, como el SAP Security Assessment, ayuda a sus clientes a mejorar los niveles de seguridad de sus sistemas SAP.
Notas julio 2025
Resumen y highlights del Mes
Este mes el número total ha sido de 31 notas, 17 más que en el mes anterior. Este mes tuvimos 6 Hot News, 5 más que en el periodo anterior. En cuanto a notas de criticidad alta, hay 5, igual que en los 3 meses anteriores. Las notas medias y bajas no serán revisadas, por lo que daremos detalle de un total de 11 notas (todas las que tengan un CVSS de 7 o mayor).
Tenemos un total de 31 notas para todo el mes (27 nuevas y 4 actualizaciones de notas publicadas en meses anteriores).
Revisaremos en detalle un total de 11 notas, todas de criticidad alta y Hot News:
-
La nota mas alta en criticidad del mes (CVSS 10) es una es una Hot News, y se trata de una actualización de una nota publicada en mayo relacionada con “Multiple vulnerabilities in SAP Supplier Relationship Management (Live Auction Cockpit)”
-
La siguiente en criticidad (CVSS 9,9) se trata de una nota relacionada con “Code Injection vulnerability in SAP S/4HANA and SAP SCM (Characteristic Propagation)”.
-
La siguientes en criticidad (CVSS 9,1) son 4 Hot News, relacionadas con “Insecure Deserialization in SAP NetWeaver Enterprise Portal Federated Portal Network”, “Insecure Deserialization in SAP NetWeaver Enterprise Portal Administration”, “Insecure Deserialization vulnerability in SAP NetWeaver (XML Data Archiving Service)” y con “Insecure Deserialization in SAP NetWeaver Application Server for Java (Log Viewer )”.
-
La siguientes en criticidad (CVSS 8,1) son dos notas altas relacionadas con “Missing Authentication check after implementation of SAP Security Note 3007182 and 3537476” y con “Missing Authorization check in SAP NetWeaver Application Server for ABAP”
-
La siguiente en criticidad (CVSS 8,0) se trata de una nota relacionada con “Insecure File Operations vulnerability in SAP Business Objects Business Intelligence Platform (CMC)”
-
La siguiente en criticidad (CVSS 7,7) se trata de una nota relacionada con “Missing Authorization check in SAP Business Warehouse and SAP Plug-In Basis”
-
Por último, la última nota que vamos a analizar y la más baja en criticidad (CVSS 7,6) se trata de una actualización de una nota del mes pasado relacionada con “Directory Traversal vulnerability in SAP NetWeaver Visual Composer”
-
Este mes el tipo más predominante es “Missing Authorization Check ” (8/31 en el patch day)
En la gráfica podemos ver la clasificación de las notas de julio, además de la evolución y clasificación de los últimos 5 meses anteriores (solo las notas del Sec. Tuesday / Patch Day – by SAP):
Detalle completo
El detalle completo de las notas más relevantes es el siguiente (en inglés):
-
Multiple vulnerabilities in SAP Supplier Relationship Management (Live Auction Cockpit) (update) (3578900): This SAP Security Note addresses five critical vulnerabilities in SRM Live Auction Cockpit, including a critical insecure deserialization flaw (CVE-2025-30012) with a CVSS score of 10.0. The issues stem from deprecated Java Applet components, now fully removed or replaced in newer versions. SAP recommends migrating to DHTML-based SRM Live Auction or removing legacy components using deployment tools. Refer to Notes 2369341, 2171391, and 1715441 for remediation steps. CVSS v3 Base Score 10/ 10 [CVE-2025-30012]
-
Code Injection vulnerability in SAP S/4HANA and SAP SCM (Characteristic Propagation) (3618955): A remote code execution vulnerability in SAP S/4HANA and SCM Characteristic Propagation allows authenticated internal users to inject and execute OS-level commands, risking full system compromise. The issue is mitigated by blocking the injection of malicious code from external systems. Apply the relevant correction instructions or support packages to resolve the vulnerability. There is no workaround. CVSS v3 Base Score 9,9/ 10 [CVE-2025-42967]
-
Insecure Deserialization in SAP NetWeaver Enterprise Portal Federated Portal Network (3620498) SAP NetWeaver Enterprise Portal (FPN) has an insecure deserialization vulnerability that may allow privileged users to execute malicious code, compromising system security. The deserialization logic has been improved to validate input. SAP recommends applying the provided patches, as the optional workaround is only a temporary measure and the vulnerable endpoint is already access-restricted to admin users. CVSS v3 Base Score 9,1/ 10 [CVE-2025-42980]
-
Insecure Deserialization in SAP NetWeaver Enterprise Portal Administration) (3621236): A vulnerability in SAP NetWeaver Enterprise Portal Administration allows privileged users to upload and deserialize malicious content, potentially leading to remote code execution. Input validation during deserialization has been enhanced. SAP recommends applying the relevant patches, as the workaround is only temporary and the vulnerable endpoint is already limited to highly privileged administrators. CVSS v3 Base Score 9,1/ 10 [CVE-2025-42964]
-
Insecure Deserialization vulnerability in SAP NetWeaver (XML Data Archiving Service) (3610892): SAP NetWeaver XML Data Archiving Service (XML DAS) contains an insecure Java deserialization vulnerability that can be exploited by authenticated admin users, potentially compromising system confidentiality, integrity, and availability. The deserialization logic has been strengthened. Apply the corresponding patch and follow SAP Note 952402 for full remediation. CVSS v3 Base Score 9,1/ 10 [CVE-2025-42966]
-
Insecure Deserialization in SAP NetWeaver Application Server for Java (Log Viewer ) (3621771): A critical vulnerability in SAP NetWeaver AS Java Log Viewer allows authenticated admin users to exploit unsafe Java deserialization, potentially leading to full OS compromise. The patch eliminates the issue by removing the vulnerable RM module. SAP recommends applying the relevant support packages and reviewing SAP Note 1974464 to avoid dependency issues. As a temporary workaround, the LogViewer component can be disabled via a startup filter, with logs still accessible through SAP MMC or the file system. Full details are provided in FAQ note 3626657. CVSS v3 Base Score 9,1/ 10 [CVE-2025-42963]
-
Missing Authentication check after implementation of SAP Security Note 3007182 and 3537476 (3600846): A replay attack vulnerability allows an unauthenticated attacker to reuse a Hashed Message Authentication Code (HMAC) credential from a system missing specific security patches, potentially compromising a fully patched target system. The solution involves deleting and regenerating the HMAC key, with careful validation of system state to avoid issues with tRFC, qRFC, bgRFC, or recorded HTTP calls. Follow the steps outlined to delete the old HMAC key and regenerate it during a short downtime, ensuring secure system operations. CVSS v3 Base Score 8,1/ 10 [CVE-2025-42959]
-
Missing Authorization check in SAP NetWeaver Application Server for ABAP (3623440): A privilege escalation vulnerability in SAP NetWeaver System Configuration allows authenticated users to bypass necessary authorization checks, potentially compromising the system’s integrity and availability. The solution involves implementing an authorization check for the ‘S_RZL_ADM’ profile with Activity ’01’. SAP recommends applying the support package or correction instructions provided. As a temporary workaround, restrict the use of the S_RFC authorization to specific functions or function groups, though the permanent fix is preferred. CVSS v3 Base Score 8,1/ 10 [CVE-2025-42953]
-
Insecure File Operations vulnerability in SAP Business Objects Business Intelligence Platform (CMC) (3565279): SAP Business Objects Business Intelligence Platform (CMC) uses an older version of Apache Struts (2.5.33) with the vulnerability, which allows for unrestricted file uploads and potential malicious file execution by administrators. The solution is to update Apache Struts to a secure version. SAP recommends applying the necessary patches listed in the security note. For additional details, refer to Knowledge Base Article 2144559 regarding maintenance strategy. There is no workaround. CVSS v3 Base Score 8,0/ 10 [CVE-2024-53677]
-
Missing Authorization check in SAP Business Warehouse and SAP Plug-In Basis (3623255): A vulnerability in SAP Business Warehouse and SAP Plug-In Basis allows authenticated attackers to add fields to SAP database tables or structures, potentially causing system short dumps and impacting availability. The issue stems from missing authorization checks in a report comparing middleware structures between CRM and ERP. The solution involves adding an authorization check (SCRMMW) to the affected RFC function module. SAP recommends implementing the correction instructions or support packages provided in the security note. CVSS v3 Base Score 7,7/ 10 [CVE-2025-42952]
-
Directory Traversal vulnerability in SAP NetWeaver Visual Composer (update) (3610591): SAP NetWeaver Visual Composer has a Directory Traversal vulnerability caused by insufficient validation of input paths from high-privileged users, allowing arbitrary file access and compromising confidentiality. The issue has been addressed by improving URL parameter validation. The update reintroduces a workaround for versions without a patch, which involves un-deploying the VisualComposerServerEar05.ear file (part of VCBASE.SCA). SAP recommends applying the relevant support packages or patches and reviewing KBA 3619959 for more information on the workaround. CVSS v3 Base Score 7,6/ 10 [CVE-2025-42977]
Enlaces de referencia
Referencias, en inglés de SAP y Onapsis (julio):
SAP Security Patch Day – July 2025
SAP Patch Day: July 2025 – Onapsis
Recursos afectados
El listado completo de los sistemas/componentes afectados es el siguiente:
-
SAP Supplier Relationship Management (Live Auction Cockpit) Version – SRM_SERVER 7.14
-
SAP S/4HANA and SAP SCM (Characteristic Propagation) Versions – SCMAPO 713, 714, S4CORE 102, 103, 104, S4COREOP 105, 106, 107, 108, SCM 700, 701, 702, 712
-
SAP NetWeaver Enterprise Portal Federated Portal Network Version – EP-RUNTIME 7.50
-
SAP NetWeaver Enterprise Portal Administration Version – EP-RUNTIME 7.50
-
SAP NetWeaver (XML Data Archiving Service) Version – J2EE-APPS 7.50
-
SAP NetWeaver Application Server for Java (Log Viewer) Version – LMNWABASICAPPS 7.50
-
SAP NetWeaver ABAP Server and ABAP Platform Versions – SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 914, 915
-
SAP Business Objects Business Intelligence Platform (CMC) Versions – ENTERPRISE 430, 2025
-
SAP Business Warehouse and SAP Plug-In Basis Versions – PI_BASIS 2006_1_700, 701, 702, 731, 740, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816
-
SAP NetWeaver Visual Composer Version – VCBASE 7.50