SAP Releases Security Updates Addressing 21 Vulnerabilities, 4 Critical

SAP’s September 2025 Security Patch Day delivers urgent fixes for 21 vulnerabilities across SAP products, including four critical flaws that demand immediate attention.

Organizations should prioritize these Security Notes by accessing the Support Portal and applying patches without delay to maintain a hardened SAP landscape.

Critical Vulnerabilities

This month’s patch cycle addresses four critical issues, all rated CVSS 9.0 or above.

The most severe is an insecure deserialization flaw in SAP NetWeaver (RMI-P4) that carries a CVSS score of 10.0 and allows unauthenticated remote code execution.

Another critical note fixes an insecure file operations vulnerability in SAP NetWeaver AS Java, also enabling remote attack vectors with a 9.9 score.

Two additional critical updates remedy a directory traversal bug in NetWeaver AS for ABAP (CVSS 9.6) and a missing authentication check in core NetWeaver (CVSS 9.1).

Exploiting any of these could lead to complete system compromise, data exfiltration, or administrative takeover.

Note#CVETitlePriorityCVSS
3634501CVE-2025-42944Insecure Deserialization in SAP NetWeaver (RMI-P4)Critical10.0
3643865CVE-2025-42922Insecure File Operations in SAP NetWeaver AS Java (Deploy Web Service)Critical9.9
3302162*CVE-2023-27500Directory Traversal in SAP NetWeaver AS for ABAPCritical9.6
3627373CVE-2025-42958Missing Authentication Check in SAP NetWeaverCritical9.1

*Update to Security Note released on March 2023 Patch Day.

High, Medium, and Low Findings

Beyond the critical flaws, SAP released patches for eleven high-severity, six medium-severity, and two low-severity issues.

High-severity fixes include input validation gaps in SAP Business One SLD and S/4HANA replication servers (CVSS 8.1–8.8). A path traversal vulnerability in Service Data Collection (CVSS 7.7) is also patched.

Medium-severity notes cover security misconfigurations in Commerce Cloud and Datahub (CVSS 6.6), denial-of-service in Business Planning and Consolidation (CVSS 6.5), and several missing authorization checks in SAP HCM and NetWeaver Application Server (CVSS 5.0–6.5).

Low-severity updates address reverse tabnabbing in Fiori Launchpad (CVSS 3.5) and an outdated OpenSSL disclosure in Adobe Document Service (CVSS 3.4), plus a 2024 Commerce Cloud resource release flaw (CVSS 3.1).

Organizations should adopt a risk-based approach: patch all critical issues first, followed by high-severity vulnerabilities within their change window, then medium and low as part of routine maintenance.

Maintaining an up-to-date patch posture is vital to defend against automated exploits and targeted attacks.

SAP customers are advised to monitor the Support Portal for any further updates or extended notes related to these vulnerabilities.

Regular patching, combined with network segmentation and least-privilege access controls, will significantly reduce exposure and protect business-critical processes.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here