SAP Patch Day: January 2025

Security Notes

Two HotNews Notes released for SAP NetWeaver AS for ABAP and ABAP Platform

Highlights of January SAP Security Notes analysis include:

  • January Summary Thirteen new SAP security patches released, including two HotNews Notes and three High Priority Notes
  • SAP HotNews Notes — Critical vulnerabilities in SAP NetWeaver AS for ABAP and ABAP Platform can lead to complete system compromise 
  • Onapsis Research Labs Contribution Our team supported SAP in patching the two HotNews vulnerabilities and one Medium Priority vulnerability

SAP has published thirteen new SAP Security Notes on its first Patch Day in 2025, including two HotNews Notes and three High Priority Notes. Three of the thirteen Security Notes were published in contribution with the Onapsis Research Labs.

The HotNews Notes in detail

The Onapsis Research Labs (ORL) supported SAP in patching two critical vulnerabilities in SAP NetWeaver AS for ABAP and ABAP Platform. Both are tagged with a CVSS score of 9.9 and  affect HTTP communication scenarios.

SAP Security Note #3537476 patches an Improper Authentication vulnerability allowing an attacker to steal credentials from an internal RFC communication between server A (HTTP client) and server B (serving the request) of the same system. These credentials can be used in a subsequent step to start a new HTTP communication between an external program C and server A pretending to be an internal caller against server A. This causes a high impact on the confidentiality, integrity, and availability of the application. 

The second HotNews vulnerability was detected in a test report that was unintentionally shipped to customers. Under certain conditions SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Framework) allow an attacker to read decrypted, plaintext credential information required to communicate to other systems. This does not only pose the local system at high risk but can also have a serious impact on other systems. The patch included in SAP Security Note #3550708 disables the vulnerable report.

The High Priority Notes in detail

SAP Security Note #3550816, tagged with a CVSS score of 8.8, deactivates some remote-enabled function modules which could be used by an attacker to inject SQL code when accessing Informix databases. This allows them to gain control over the data in the affected database, leading to complete compromise of confidentiality, integrity and availability.

SAP Security Note #3474398, patches two vulnerabilities in SAP BusinessObjects Business Intelligence Platform:

An Information disclosure vulnerability, tagged with a CVSS score of 8.7, allows an unauthenticated attacker to perform session hijacking over the network without any user interaction. Attackers can access and modify data of the affected user in the application and thus cause a high impact on the confidentiality and the integrity of the system.

A Code Injection vulnerability, tagged with a CVSS score of 6.5, enables an authenticated user with restricted access to inject malicious JS code. The code can be used to read sensitive information from the server and send it to the attacker. In a subsequent step, the attacker could use this information to impersonate a highly privileged user causing a high impact on confidentiality and integrity of the application.
SAP Security Note #3542533, tagged with a CVSS score of 7.8, describes a DLL Hijacking vulnerability in SAPSetup. The vulnerability allows an attacker with either local user privileges or with access to a compromised corporate user’s Windows account to gain higher privileges. This can lead to high impact on confidentiality, integrity and availability of the Windows server since the higher privileges could be used to move laterally within the network and compromise the active directory of the company.

Onapsis Contribution

In addition to the two HotNews vulnerabilities, our ORL team contributed to patching some remote-enabled function modules which do not check for appropriate authorizations. This allows an authenticated attacker to obtain information that would otherwise be restricted, resulting in a low impact on the confidentiality of the application. SAP Security Note #3550674, tagged with a CVSS score of 4.3 patches the function modules through deactivation.

Summary & Conclusions

2025 starts for SAP customers with the announcement of some critical vulnerabilities that require immediate patching. Since they affect SAP NetWeaver AS for ABAP and ABAP Platform, most of the SAP systems are exposed at high risk when keeping them unpatched.

SAP NoteTypeDescriptionPriorityCVSS
3537476New[CVE-2025-0070] Improper Authentication in SAP NetWeaver ABAP Server and ABAP Platform
BC-MID-ICF
HotNews9.9
3550708New[CVE-2025-0066] Information Disclosure vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform(Internet Communication Framework)
BC-MID-ICF
HotNews9.9
3550816New[CVE-2025-0063] SQL Injection vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
BC-DB-INF
High8.8
3474398New[CVE-2025-0061] Multiple vulnerabilities in SAP BusinessObjects Business Intelligence Platform
BI-BIP-INV
High8.7
3542533New[CVE-2025-0069] DLL Hijacking vulnerability in SAPSetup
BC-FES-INS
High7.8
3542698New[CVE-2025-0058] Information Disclosure vulnerability in SAP Business Workflow and SAP Flexible Workflow
BC-BMT-WFM
Medium6.5
3540108New[CVE-2025-0067] Missing Authorization check in SAP NetWeaver Application Server Java
BC-WD-JAV
Medium6.3
3502459New[CVE-2025-0056] Information Disclosure vulnerability in SAP GUI for Java
BC-FES-JAV
Medium6.0
3472837New[CVE-2025-0055] Information Disclosure vulnerability in SAP GUI for Windows
BC-FES-GUI
Medium6.0
3503138New[CVE-2025-0059] Information Disclosure vulnerability in SAP NetWeaver Application Server ABAP (applications based on SAP GUI for HTML)
BC-FES-WGU
Medium6.0
3536461New[CVE-2025-0053] Information Disclosure Vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform
BC-MID-ICF
Medium5.3
3514421New[CVE-2025-0057] Cross-Site Scripting vulnerability in SAP NetWeaver AS JAVA (User Admin Application)
BC-JAS-SEC-UME
Medium4.8
3550674New[CVE-2025-0068] Missing Authorization check in Remote Function Call (RFC) in SAP NetWeaver Application Server ABAP
BC-BMT-WFM
Medium4.3

As always, the Onapsis Research Labs is already updating The Onapsis Platform to incorporate the newly published vulnerabilities into the product so that our customers can protect their businesses.

For more information about the latest SAP security issues and our continuous efforts to share knowledge with the security community, subscribe to our Defenders Digest Onapsis Newsletter.