Watch out – this SAP NetWeaver bug has a maximum severity score, and it could target your servers next

zeeforce
3 Min Read




  • SAP patched CVE-2025-42944, a critical flaw allowing unauthenticated OS command execution
  • Two more severe vulnerabilities affect SAP Print Service and Supplier Relationship Management modules
  • Unpatched systems remain exposed; n-day flaws are widely exploited due to delayed patching

Software giant SAP released additional security hardening for a maximum-severity vulnerability that grants threat actors arbitrary command execution capabilities on compromised endpoints.

Earlier this week, the company published a new security advisory, detailing fixes for a total of 17 vulnerabilities (13 fixes and 4 updates), including a 10/10 “insecure deserialization in SAP NetWeaver AS Java” flaw. Tracked as CVE-2025-42944, the flaw allowed threat actors to exploit systems through the RMI-P4 module by submitting malicious payloads to an open port.





Source link

Share This Article
Leave a comment
Optimized by Optimole
Verified by MonsterInsights