[Security Vulnerability Alert] SAP has issued a critical cybersecurity advisory for two of its products (CVE-2025-42928) and (CVE-2025-42880).

 
2025/12/16 ~ 2026/6/16
View Count:48

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202512-00000005

[Content Description]
【CVE-2025-42928, CVSS: 9.1】 This vulnerability is a deserialization vulnerability. A user with high privileges could exploit this vulnerability to trigger a remote code execution attack, affecting the confidentiality, integrity, and availability of the system.

【CVE-2025-42880, CVSS: 9.9】 Due to the lack of input filtering mechanisms, SAP Solution Manager allows a verified attacker to inject malicious code when calling remote support function modules, potentially affecting the confidentiality, integrity, and availability of the system.

[Affected Platforms]
【CVE-2025-42928】 SAP jConnect - SDK for ASE SYBASE_SOFTWARE_DEVELOPER_KIT 16.0.4, 16.1 versions

【CVE-2025-42880】 SAP Solution Manager ST version 720

[Recommended Actions]
Patch according to the solutions released on the official website: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/december-2025.html

Files
None
Top↑