ShinyHunters Allegedly Release Exploit for SAP 0-Day Vulnerability

A weaponized exploit targeting the critical SAP vulnerability CVE-2025-31324 has been publicly released, raising immediate concerns for organizations running unpatched SAP systems.

The exploit, published on August 15, 2025, by VX Underground via X (formerly Twitter), was allegedly distributed by the threat group “Scattered LAPSUS$ Hunters – ShinyHunters” through a Telegram channel.

Vulnerability Analysis and Technical Details

CVE-2025-31324, affecting SAP NetWeaver Visual Composer, carries the maximum CVSS severity score of 10.0, enabling unauthenticated attackers to achieve complete system compromise.

The exploit chains this vulnerability with CVE-2025-42999, a deserialization flaw discovered by Onapsis Research Labs through their Global SAP Threat Intelligence Network.

The attack vector operates through a sophisticated two-stage exploitation process: attackers first leverage the missing authentication vulnerability (CVE-2025-31324) to bypass security controls, then exploit the deserialization flaw (CVE-2025-42999) to execute malicious payloads with SAP administrator privileges.

This combination enables remote code execution (RCE) and facilitates “living off the land” techniques, allowing attackers to execute operating system commands without deploying persistent artifacts.

Deserialization Gadget Concerns

The published exploit demonstrates threat actors’ deep knowledge of SAP architecture, utilizing specific custom SAP classes, including com.sap.sdo.api.* and com.sap.sdo.impl.* as fundamental components of the deserialization gadget.

The exploit dynamically adjusts payloads based on SAP NetWeaver versions, indicating a sophisticated understanding of version-specific implementation differences.

Security researchers express particular concern regarding the reusability of this deserialization gadget across other SAP components, potentially enabling exploitation of additional vulnerabilities discovered in July 2025.

The following table summarizes the critical SAP vulnerabilities requiring immediate attention:

CVE IDCVSS ScoreSAP Security NoteVulnerability TypePatch Status
CVE-2025-3132410.03594142Authentication BypassPatched April 2025
CVE-2025-429999.13604119DeserializationPatched May 2025
CVE-2025-3001210.03578900DeserializationPatched July 2025
CVE-2025-429809.13620498DeserializationPatched July 2025
CVE-2025-429669.13610892DeserializationPatched July 2025

Immediate Response Requirements

Organizations must immediately apply all available SAP security patches, particularly Security Notes 3594142 and 3604119.

Additional mitigation strategies include restricting internet access to SAP applications and implementing comprehensive monitoring for indicators of compromise, including unexpected file uploads and unusual process execution.

The publication of this exploit code typically triggers subsequent attack waves, making immediate patch deployment critical for preventing system compromise, data theft, and business disruption.

Organizations utilizing Onapsis platforms benefit from existing comprehensive coverage, while open-source scanners remain available from Onapsis and Mandiant for vulnerability assessment.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here