Security

Patches

Emergency patch for potential SAP zero-day that could grant full system control

German software giant paywalls details, but experts piece together the clues


SAP's latest out-of-band patch is for a perfect 10/10 bug in NetWeaver that experts suspect could have already been exploited as a zero-day.

However, we can't say for sure whether that's the case because the German software shop has restricted access to the details behind a customer paywall.

The vulnerability's CVE identifier is known, though, (CVE-2025-31324) and from the limited description entered into the National Vulnerability Database, we understand it's a flaw with the metadata uploader component in NetWeaver's no-code Visual Composer app-building tool.

The NVD entry reads: "SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system."

According to SAP security platform Onapsis, the vulnerability has indeed already been exploited as a zero-day and can afford attackers the opportunity to take full control over SAP business data and processes.

That means the potential for ransomware deployment and lateral movement around a network is also on the cards.

"We strongly recommend SAP customers to apply the emergency patch released by SAP earlier today, and assess vulnerable systems for compromise," it said via LinkedIn.

Elsewhere, infosec watchers have noted the similarities between the limited description of the issue and the verbiage used by ReliaQuest in its writeup of a mystery vulnerability in SAP NetWeaver, published earlier this week.

ReliaQuest researchers said on April 22 they had been investigating "multiple customer incidents" involving JSP webshells uploaded to SAP environments, several of which were fully updated and had patches applied.

These webshells allowed attackers to upload files and execute code. At the time of publication, ReliaQuest said the issue at play was likely due to the exploitation of an old NetWeaver bug (CVE-2017-9844, 9.8) or a brand-new, undisclosed issue.

Incident response efforts showed attackers who had already broken into customer environments were using the Brute Ratel red-teaming tool and the Heaven's Gate technique for code execution and detection evasion.

ReliaQuest also warned that any potential exploits of the vulnerability could lead to compromises of high-value targets.

Given that SAP is routinely used by large organizations and governments around the world – extensively throughout local and national government in the UK, for example – any zero-day vulnerabilities that could lead to ransomware are highly valuable to attackers.

The Register asked SAP for more details. ®

Send us news
2 Comments

Users find RISE with SAP service levels below industry standard

Gartner also says customers say ERP vendor's internal processes cause delays

Curl project founder snaps over deluge of time-sucking AI slop bug reports

Lead dev likens flood to 'effectively being DDoSed'

As US vuln-tracking falters, EU enters with its own security bug database

EUVD comes into play not a moment too soon

Microsoft tries to knife passwords once and for all - at least for consumers

PLUS: AirPlay exploits; Six-year old backdoor opens; Raytheon settles federal charges; and more!

Enterprise tech dominates zero-day exploits with no signs of slowdown

As Big Tech gets used to the pain, smaller vendors urged to up their game

'We still have embeds in CISA': CTO of Brit cyber agency talks post-Trump relationship with US counterpart

Both agencies seem unbothered despite tech world's clear concerns for US infoseccers

Pentagon declares war on 'outdated' software buying, opens fire on open source

(If only that would keep folks off unsanctioned chat app side quests)

Samsung admits Galaxy devices can leak passwords through clipboard wormhole

PLUS: Microsoft fixes messes China used to attack it; Mitre adds ESXi advice; Employee-tracking screenshots leak; and more!

DOGE worker's old creds found exposed in infostealer malware dumps

PLUS: Celsius scammer sent to slammer; Death-by-hacking victim warns you're never safe; and more

Britain's cyber agents and industry clash over how to tackle shoddy software

Providers argue that if end users prioritized security, they'd get it

Infosec pros tell Trump to quit bullying Chris Krebs – it's undermining security

Top voices warn that political retaliation puts democracy and national defense at risk

Chris Krebs loses Global Entry membership amid Trump feud

President's campaign continues against man he claims covered up evidence of electoral fraud in 2020