Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    The AI Hype Index: AI-powered toys are coming

    June 27, 2025

    How to Schedule Incremental Backups Using rsync and cron

    June 27, 2025

    Hacker ‘IntelBroker’ charged in US for global data theft breaches

    June 27, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide
    Cyber Security

    China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide

    MichaBy MichaMay 13, 2025No Comments4 Mins Read
    China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide


    May 13, 2025Ravie LakshmananVulnerability / Threat Intelligence

    Critical SAP NetWeaver Vulnerability Targeted by Nation-State Actors

    A newly disclosed critical security flaw in SAP NetWeaver, tracked as CVE-2025-31324, is being exploited by multiple China-linked nation-state actors, targeting vital infrastructure networks worldwide. This vulnerability, the unauthenticated file upload flaw, allows for remote code execution (RCE), posing a serious threat to organizational cybersecurity.

    According to researcher Arda Büyükkaya from EclecticIQ, this vulnerability has become part of a broader campaign aimed at critical infrastructure sectors. Targeted organizations include natural gas and water distribution utilities in the UK, medical device manufacturers, and oil and gas exploration firms in the United States, as well as financial regulatory agencies in Saudi Arabia.

    Threat Landscape Analysis

    The findings from EclecticIQ reveal that an openly accessible directory on an attacker-controlled server (IP: 15.204.56[.]106) contains event logs documenting activities across various compromised systems. Notably, this confirms various breaches and provides insights into current and future attack strategies.

    Chinese threat clusters such as UNC5221 and UNC5174 have been linked to exploiting existing vulnerabilities in widely deployed systems like SAP NetWeaver. They have successfully infiltrated numerous high-value targets in South Asia, typically using known weaknesses in IIS, Apache Tomcat, and MS-SQL servers.

    Exploiting CVE-2025-31324

    Recent reconnaissance has shown that three distinct Chinese hacking groups are leveraging the SAP NetWeaver vulnerability to establish persistent remote access and execute malicious programs. The details include:

    • **CL-STA-0048:** Attempted to create a reverse shell connection to a previously identified malicious IP (43.247.135[.]53).
    • **UNC5221:** Utilized a web shell to deploy KrustyLoader, a Rust-based malware capable of serving secondary payloads and establishing persistence.
    • **UNC5174:** Managed to download SNOWLIGHT, a loader responsible for fetching a Go-based remote access trojan named VShell, along with a backdoor known as GOREVERSE.

    “China-linked APTs are likely to intensify their focus on internet-exposed enterprise applications and edge devices, thereby gaining long-term access to critical infrastructure networks globally,” Büyükkaya added.

    Exploited SAP NetWeaver Vulnerability

    New SAP Security Patches

    In response to the escalating threats linked to CVE-2025-31324, SAP has released crucial patches as of May 2025. Recent attributions by security firm Onapsis indicate an uptick in exploitation attempts using public vulnerability information, which amplifies the risks for organizations relying on SAP NetWeaver.

    Moreover, another severe flaw has been discovered in the Visual Composer Metadata Uploader component of SAP NetWeaver, categorized as CVE-2025-42999 with a CVSS score of 9.1. This deserialization vulnerability, if exploited by privileged users, could potentially lead to malicious content uploads.

    Given these active threats, organizations are strongly encouraged to update to the latest SAP version to ensure robust cybersecurity defenses.

    Final Thoughts on Cybersecurity in 2025

    The recent surge in targeted exploits against SAP NetWeaver showcases the evolving landscape of cyber threats. Cybersecurity professionals must prioritize the patching of critical vulnerabilities and maintain vigilant security measures to safeguard sensitive infrastructure. As nation-state actors continue to focus on widely used platforms, organizations must adopt a proactive approach to cybersecurity.

    Did you find this article insightful? Stay updated by following us on Twitter  and LinkedIn.

    Frequently Asked Questions (FAQ)

    What are the implications of the CVE-2025-31324 vulnerability?

    This vulnerability can allow unauthorized remote access to systems running SAP NetWeaver, potentially compromising sensitive data and critical infrastructure operations.

    How can organizations protect themselves against such cyber threats?

    Organizations should regularly apply security patches, conduct vulnerability assessments, and implement robust security architecture to defend against exploits targeting enterprise applications.

    What should I do if I suspect my SAP system has been compromised?

    If you suspect a compromise, disconnect the affected system from the network, analyze logs for suspicious activity, and consult with a cybersecurity expert to assess the situation and recommend remedial steps.



    Read the original article

    0 Like this
    APTs Breach ChinaLinked critical CVE202531324 exploit SAP systems worldwide
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleMy Top 3 Proxmox Server Builds for Performance and Efficiency
    Next Article This $24 Lucky Miner USB stick is a 210.7 trillion-to-one lottery ticket where the prize is a single BTC

    Related Posts

    Cyber Security

    Hacker ‘IntelBroker’ charged in US for global data theft breaches

    June 27, 2025
    Cyber Security

    Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options

    June 27, 2025
    Cyber Security

    A Future World Of AI-Driven Network Security Solutions

    June 25, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.