Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    Apple plays it safe on AI despite Wall Street pressure

    June 12, 2025

    Nano Tips, Wayland-only Ubuntu, End of Mint 20 and 13 Years of It’s FOSS

    June 12, 2025

    How to Write Smarter ChatGPT Prompts: Techniques & Examples

    June 10, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»SAP patches second zero-day flaw exploited in recent attacks
    Cyber Security

    SAP patches second zero-day flaw exploited in recent attacks

    MichaBy MichaMay 14, 2025No Comments3 Mins Read

    SAP patches second zero-day flaw exploited in recent attacks

    SAP has issued urgent patches for critical vulnerabilities affecting SAP NetWeaver servers, following zero-day attacks that exploited these flaws. This article details the vulnerabilities, related security recommendations, and the implications for enterprises relying on SAP systems. Stay informed to protect your network and data.

    Critical SAP Cyber Security Vulnerabilities Exposed

    SAP has promptly addressed two critical vulnerabilities in its SAP NetWeaver servers, recently exploited as zero-day attacks. On May 12, SAP announced security updates for CVE-2025-42999, a flaw discovered while probing another critical vulnerability, CVE-2025-31324, which was previously addressed in April.

    “We urge all customers using SAP NETWEAVER to apply these patches immediately to safeguard their systems,” stated a SAP representative. Further information can be found in the security notes: 3594142 & 3604119.

    The Threat Landscape: Zero-Day Attacks

    In a significant security breach, ReliaQuest highlighted the exploitation of CVE-2025-31324—the initial zero-day vulnerability—where threat actors uploaded JSP web shells to public directories following unauthorized file uploads in SAP NetWeaver. Reports indicate that compromised instances had been fully patched, stressing the attackers’ use of zero-day exploits.

    This malicious activity was corroborated by cybersecurity experts from watchTowr and Onapsis, which identified backdoor web shell uploads on vulnerable installations. Notably, Forescout’s Vedere Labs linked some attacks to a Chinese threat actor known as Chaya_004.

    Vulnerable Instances: A Widespread Concern

    According to Onyphe CTO Patrice Auffret, approximately 20 Fortune 500 companies are currently vulnerable, with many already compromised. Shadowserver Foundation has tracked over 2,040 exposed SAP NetWeaver servers vulnerable to these ongoing attacks.

    Vulnerable SAP NetWeaver servers
    Vulnerable SAP NetWeaver servers exposed online (Shadowserver Foundation)

    Understanding the New Vulnerability

    While SAP has not confirmed active exploitation of CVE-2025-42999, Onapsis CTO Juan Pablo Perez-Etchegoyen indicated that attackers have been chaining both vulnerabilities since January. Exploiting the lack of authentication (CVE-2025-31324) alongside an insecure de-serialization (CVE-2025-42999) vulnerability allowed attackers to execute arbitrary commands remotely.

    SAP administrators are strongly advised to patch their systems immediately and consider disabling Visual Composer services where feasible. Additionally, restrict access to metadata uploader services and consistently monitor for unusual activities on servers.

    CISA’s Involvement and Recommendations

    As a response to the severe risks these vulnerabilities pose, CISA has included CVE-2025-31324 in its Known Exploited Vulnerabilities Catalog. Federal agencies must secure their systems by May 20, as mandated by Binding Operational Directive (BOD) 22-01.

    “Such vulnerabilities often serve as attack vectors for cybercriminals, posing significant risks to the integrity of federal systems,” CISA emphasized in its advisory.

    Conclusion: Strengthening Cyber Security Posture

    In light of these recent SAP vulnerabilities, every organization utilizing SAP systems must act swiftly to protect sensitive data and infrastructure. Regularly updating security protocols and staying informed about new threats will significantly enhance your cyber security posture.

    Frequently Asked Questions (FAQ)

    1. What should organizations do to protect against these vulnerabilities?

    Organizations should immediately apply the latest security patches, disable unnecessary services, and monitor their infrastructure for unusual activities to mitigate risks effectively.

    2. How can businesses stay informed about cyber security threats?

    Regularly follow updates from trusted sources like cybersecurity blogs, government advisories, and reputable tech news websites to stay on top of emerging threats and vulnerabilities.

    3. What are Zero-Day vulnerabilities, and why are they dangerous?

    Zero-Day vulnerabilities are flaws in software that are exploited by attackers before the vendor is aware or has provided a fix. They are particularly dangerous because they are not yet patched, making systems highly susceptible to attacks.

    Read the original article

    0 Like this
    attacks exploited flaw patches SAP zeroday
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleDoom: The Dark Ages – id Software’s latest is a defining moment for current generation technology
    Next Article Inkscape 1.4.2 Adds Initial Support for Importing Vectornator / Linearity Curve Files

    Related Posts

    Cyber Security

    BladedFeline: Whispering in the dark

    June 8, 2025
    Cyber Security

    Huge Market Opportunity for MSPs

    June 7, 2025
    Cyber Security

    Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

    June 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.