SAP a l’heure du Cloud : Comprendre et appliquer le modèle de responsabilité partagée
Sécurisez SAP dans le cloud et comprenez le modèle de Responsabilité Partagée de RISE avec Onapsis.
Sécurisez SAP dans le cloud et comprenez le modèle de Responsabilité Partagée de RISE avec Onapsis.
Onapsis SAP Defenders Community Meet-up – June 2025
Authors Gaurav Singh and Juan Perez-Etchegoyen recently took part in the SAP PRESS Book Club webinar series, where they answered reader questions about cybersecurity for SAP over the course of an hour.
By exploiting these vulnerabilities, unauthenticated threat actors can gain unrestricted remote access to SAP business-critical data and
This consolidated threat advisory [TLP:CLEAR] is provided to support defenders in their assessment of exposure and compromise against the active mass exploitation of SAP security vulnerabilities CVE-2025-31324 and CVE-2025-42999.
The document includes exclusive threat intelligence developed by Onapsis Research Labs, along with key findings consolidated in collaboration with other trusted cybersecurity organizations.
Please note that this threat campaign is under development, and the document may be updated frequently (current version May 15, rev 4.0).
This threat advisory is a standalone resource meant to support your incident response and patch prioritization workflows. For real-time updates and ongoing analysis, refer to our continuously updated blog post.
Download the threat advisory by completing the form.
Discover key insights, gain actionable advice, and empower your organization to navigate the cloud securely during this conversation with industry experts from Onapsis and Capgemini.
Join us for an educational conversation where we delve into the world of SAP security in the cloud. As enterprises increasingly migrate their SAP systems to the cloud, it becomes imperative to address the unique security challenges that arise in this new landscape. In this thought leadership session, our experts will share best practices, solutions and practical strategies for securing SAP in the cloud, including an update on the SAP threat landscape, the Shared Fate & Responsibility Model for SAP applications and best practices to ensure the integrity, confidentiality, and availability of critical business data. Discover key insights, gain actionable advice, and empower your organization to navigate the cloud securely while harnessing the full potential of SAP.
Active exploitation against a zero-day vulnerability in SAP systems in the wild.
Evidence of active attacks against this vulnerability has been observed by ReliaQuest, Onapsis Threat Intelligence, and confirmed by multiple IR firms in recent active investigations.
SAP published an emergency security patch on April 24, 2025 to address this issue. The vulnerability is of critical severity (CVSS 10), and affects the SAP Visual Composer component of SAP Java systems, which is not enabled by default.
Critical Exploit Details:
SAP defenders were briefed on an active exploitation campaign targeting a critical CVSS 10.0 vulnerability (CVE-2025-31324). The attack campaign was executed against SAP systems around the world. Thanks to rapid response from SAP, a security patch was released quickly. However, the ongoing impact of this orchestrated attack campaign remains far-reaching and the threat of further potential exploitation of this vulnerability is still very much active.
ON DEMAND
SAP defenders were briefed on an active exploitation campaign targeting a critical CVSS 10.0 vulnerability (CVE-2025-31324). The attack campaign was executed against SAP systems around the world. Thanks to rapid response from SAP, a security patch was released quickly. However, the ongoing impact of this orchestrated attack campaign remains far-reaching and the threat of further potential exploitation of this vulnerability is still very much active.
Onapsis in collaboration with Mandiant (part of Google Cloud) invites you to a webinar to discuss the current state of the attack campaign for CVE-2025-31324, including
In the meantime, you can also view our detailed blog around this collaboration to assist defenders with this SAP zero-day.