Tuesday, March 11, 2025
HomeCVE/vulnerabilitySAP Security Update Released to Fix Multiple Vulnerabilities

SAP Security Update Released to Fix Multiple Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

SAP announced 21 new Security Notes and updates to 3 previously released notes on its latest Security Patch Day.

This release addresses critical vulnerabilities within SAP products, underscoring the company’s commitment to safeguarding enterprise software.

SAP strongly recommends customers prioritize implementing these patches to secure their systems and mitigate potential risks.

Key Vulnerabilities Addressed

The updates focus on fixing high-priority vulnerabilities that could allow attackers to compromise systems or escalate privileges.

Below is a detailed table summarizing the CVEs and associated Security Notes:

CVE-IDTitleProduct / VersionPriority
[CVE-2025-27434]Cross-Site Scripting (XSS) vulnerability in SAP Commerce (Swagger UI)SAP Commerce (Swagger UI), Version – COM_CLOUD 2211High
[CVE-2025-26661]Missing Authorization check in SAP NetWeaver (ABAP Class Builder)SAP NetWeaver (ABAP Class Builder), Versions – SAP_BASIS 700 to 914High
[CVE-2024-38286]Multiple vulnerabilities in Apache Tomcat within SAP Commerce CloudRelated to CVE-2024-52316; SAP Commerce Cloud, Versions – HY-COM 2205, COM-CLOUD 2211High
[CVE-2025-24876] (Update)Authentication bypass via authorization code injection in SAP ApprouterLibrary – @sap/approuter, Versions – 2.6.1 to 16.7.1High
[CVE-2024-39592] (Update)Missing Authorization check in SAP PDCESAP PDCE, Versions – S4CORE 102 to 108High

Highlights of the Security Notes

  1. Cross-Site Scripting (XSS) Vulnerability in SAP Commerce
    A critical XSS vulnerability ([CVE-2025-27434]) in SAP Commerce’s Swagger UI could allow attackers to execute malicious scripts in users’ browsers. With a CVSS score of 8.8, SAP urges customers to patch this flaw immediately.
  2. Missing Authorization Check in SAP NetWeaver
    Another high-scoring vulnerability ([CVE-2025-26661]), found in several SAP_BASIS versions, could lead to unauthorized access within the ABAP Class Builder component, posing threats to sensitive system data.
  3. Apache Tomcat Vulnerabilities
    The Security Note ([CVE-2024-38286]) addresses multiple vulnerabilities related to Apache Tomcat in SAP Commerce Cloud, with related CVE-2024-52316. These flaws can lead to unauthenticated code execution or privilege escalation.
  4. Updates to Previously Released Notes
    Updates to earlier Security Notes include [CVE-2025-24876] affecting SAP Approuter and [CVE-2024-39592] targeting SAP PDCE. These updates close gaps in prior patches, ensuring enhanced security.

SAP customers are advised to:

  • Visit the SAP Support Portal to access the Security Notes.
  • Apply patches without delay to secure their systems.
  • Review affected systems for potential impacts from the vulnerabilities.

SAP’s March 2025 Security Patch Day reaffirms its ongoing efforts to strengthen enterprise security.

Businesses relying on SAP products must prioritize these updates to protect against exploitation and maintain the integrity of their systems.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Evade Security Measures to Launch SIM Swap Attacks

SIM swapping fraud continues to pose a significant threat to individuals and financial institutions,...

Ebyte Ransomware Targets Windows Users with Advanced Encryption Techniques

A new ransomware variant, known as Ebyte Ransomware, has emerged as a significant threat...

macOS NULL Pointer Dereference Vulnerability Allow Attackers Exploits Kernel

Historically, NULL pointer dereferences have been a significant vulnerability in operating systems, including macOS....

Apache Camel Vulnerability Allows Attackers to Inject Arbitrary Headers

A newly disclosed security vulnerability in Apache Camel, tracked as CVE-2025-27636, has raised alarms across...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Evade Security Measures to Launch SIM Swap Attacks

SIM swapping fraud continues to pose a significant threat to individuals and financial institutions,...

Ebyte Ransomware Targets Windows Users with Advanced Encryption Techniques

A new ransomware variant, known as Ebyte Ransomware, has emerged as a significant threat...

macOS NULL Pointer Dereference Vulnerability Allow Attackers Exploits Kernel

Historically, NULL pointer dereferences have been a significant vulnerability in operating systems, including macOS....