Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

Testing Proxmox 9 Snapshots as Volume Chains on iSCSI (Tech Preview)

August 13, 2025

Z-Wave reborn – Home Assistant Connect ZWA-2

August 13, 2025

Awesome List Updates on May 17, 2025

August 13, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide
Cyber Security

China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide

MichaBy MichaMay 13, 2025No Comments4 Mins Read
China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide


May 13, 2025Ravie LakshmananVulnerability / Threat Intelligence

Critical SAP NetWeaver Vulnerability Targeted by Nation-State Actors

A newly disclosed critical security flaw in SAP NetWeaver, tracked as CVE-2025-31324, is being exploited by multiple China-linked nation-state actors, targeting vital infrastructure networks worldwide. This vulnerability, the unauthenticated file upload flaw, allows for remote code execution (RCE), posing a serious threat to organizational cybersecurity.

According to researcher Arda Büyükkaya from EclecticIQ, this vulnerability has become part of a broader campaign aimed at critical infrastructure sectors. Targeted organizations include natural gas and water distribution utilities in the UK, medical device manufacturers, and oil and gas exploration firms in the United States, as well as financial regulatory agencies in Saudi Arabia.

Threat Landscape Analysis

The findings from EclecticIQ reveal that an openly accessible directory on an attacker-controlled server (IP: 15.204.56[.]106) contains event logs documenting activities across various compromised systems. Notably, this confirms various breaches and provides insights into current and future attack strategies.

Chinese threat clusters such as UNC5221 and UNC5174 have been linked to exploiting existing vulnerabilities in widely deployed systems like SAP NetWeaver. They have successfully infiltrated numerous high-value targets in South Asia, typically using known weaknesses in IIS, Apache Tomcat, and MS-SQL servers.

Exploiting CVE-2025-31324

Recent reconnaissance has shown that three distinct Chinese hacking groups are leveraging the SAP NetWeaver vulnerability to establish persistent remote access and execute malicious programs. The details include:

  • **CL-STA-0048:** Attempted to create a reverse shell connection to a previously identified malicious IP (43.247.135[.]53).
  • **UNC5221:** Utilized a web shell to deploy KrustyLoader, a Rust-based malware capable of serving secondary payloads and establishing persistence.
  • **UNC5174:** Managed to download SNOWLIGHT, a loader responsible for fetching a Go-based remote access trojan named VShell, along with a backdoor known as GOREVERSE.

“China-linked APTs are likely to intensify their focus on internet-exposed enterprise applications and edge devices, thereby gaining long-term access to critical infrastructure networks globally,” Büyükkaya added.

Exploited SAP NetWeaver Vulnerability

New SAP Security Patches

In response to the escalating threats linked to CVE-2025-31324, SAP has released crucial patches as of May 2025. Recent attributions by security firm Onapsis indicate an uptick in exploitation attempts using public vulnerability information, which amplifies the risks for organizations relying on SAP NetWeaver.

Moreover, another severe flaw has been discovered in the Visual Composer Metadata Uploader component of SAP NetWeaver, categorized as CVE-2025-42999 with a CVSS score of 9.1. This deserialization vulnerability, if exploited by privileged users, could potentially lead to malicious content uploads.

Given these active threats, organizations are strongly encouraged to update to the latest SAP version to ensure robust cybersecurity defenses.

Final Thoughts on Cybersecurity in 2025

The recent surge in targeted exploits against SAP NetWeaver showcases the evolving landscape of cyber threats. Cybersecurity professionals must prioritize the patching of critical vulnerabilities and maintain vigilant security measures to safeguard sensitive infrastructure. As nation-state actors continue to focus on widely used platforms, organizations must adopt a proactive approach to cybersecurity.

Did you find this article insightful? Stay updated by following us on Twitter  and LinkedIn.

Frequently Asked Questions (FAQ)

What are the implications of the CVE-2025-31324 vulnerability?

This vulnerability can allow unauthorized remote access to systems running SAP NetWeaver, potentially compromising sensitive data and critical infrastructure operations.

How can organizations protect themselves against such cyber threats?

Organizations should regularly apply security patches, conduct vulnerability assessments, and implement robust security architecture to defend against exploits targeting enterprise applications.

What should I do if I suspect my SAP system has been compromised?

If you suspect a compromise, disconnect the affected system from the network, analyze logs for suspicious activity, and consult with a cybersecurity expert to assess the situation and recommend remedial steps.



Read the original article

0 Like this
APTs Breach ChinaLinked critical CVE202531324 exploit SAP systems worldwide
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleMy Top 3 Proxmox Server Builds for Performance and Efficiency
Next Article This $24 Lucky Miner USB stick is a 210.7 trillion-to-one lottery ticket where the prize is a single BTC

Related Posts

Cyber Security

Teenage Hacker Stole $243M In Bitcoin. How It Happened.

August 12, 2025
Cyber Security

How to restore GPT-4o when you’ve GPT-5

August 11, 2025
Linux

10 sFTP Commands to Move Files Between Linux Systems

August 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.