Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:
IPv6:
UpOrDown
Ping
MTR
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc & Sum

SAP Warns of New High-Severity Flaws

Image © Arstechnica
SAP warns customers after attackers exploited a major flaw, flagging more than two dozen new vulnerabilities across NetWeaver and S/4HANA that require urgent patching.

Following a high-severity vulnerability being actively exploited in SAP’s flagship ERP, SAP warned customers of more than two dozen new vulnerabilities across NetWeaver and other products, including a critical flaw rated 10/10.

The most severe issue, tracked as CVE-2025-42944, resides in NetWeaver and could allow unauthenticated attackers to run arbitrary commands by sending malicious payloads to an open port. The root cause is a deserialization vulnerability.

Security researchers noted three additional high-severity NetWeaver flaws with CVSS-like ratings of 9.9, 9.6, and 9.1, underscoring the breadth of exposure across enterprise infrastructure.

Security firm SecurityBridge previously flagged a separate high-severity vulnerability, CVE-2025-42957, in SAP S/4HANA that was under active exploitation. SAP confirmed the flaw carries a 9.9 severity and impacts the ERP suite used for core business processes such as finance and HR.

SAP urged customers to patch promptly and consult its security notes for guidance. The company also highlighted additional vulnerabilities across SAP Business One, Landscape Transformation, Commerce Cloud, Datahub, and other products, with ratings spanning from 3.1 to 8.8, calling for quick mitigations.

 

Arstechnica

Related News

Nvidia Unveils Tiny Desktop AI Box
West Carolina, GOCare Forge Digital Engagement
OpenAI Trims ChatGPT Political Sway
Wasco Gets $10M Fiber Upgrade
Pixnapping Threat Expands to Android 2FA
Bluepeak Upgrades 25k Customers in SD MN

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more