#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

39 C
Dubai
Saturday, September 13, 2025
HomeTopics 4PatchSAP Patches 26 Security Flaws in September 2025: Critical NetWeaver Vulnerabilities Demand...

SAP Patches 26 Security Flaws in September 2025: Critical NetWeaver Vulnerabilities Demand Urgent Attention

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

SAP has released its September 2025 Security Patch Day fixes, addressing 21 new vulnerabilities and issuing 5 updates to previously published security notes, including several rated critical. According to SAP’s official advisory, these flaws impact widely used products such as SAP NetWeaver, SAP Business One, S/4HANA, and SAP Commerce Cloud, putting global enterprises at risk if patches are not applied immediately.

Among the most serious vulnerabilities are:

  • CVE-2025-42944Insecure Deserialization in SAP NetWeaver (RMI-P4), rated CVSS 10.0 (Critical). This flaw could allow remote code execution, giving attackers full control over targeted systems.
  • CVE-2025-42922Insecure File Operations in SAP NetWeaver AS Java (Deploy Web Service), rated 9.9 (Critical). Successful exploitation could enable attackers to manipulate sensitive files or inject malicious code.
  • CVE-2023-27500 – An updated note on Directory Traversal in SAP NetWeaver AS for ABAP and ABAP Platform, rated 9.6 (Critical), highlighting the persistence of risks in older platforms still running in production.
  • CVE-2025-42958Missing Authentication in SAP NetWeaver Kernel, rated 9.1 (Critical), which could allow unauthorized access to core business applications.

These vulnerabilities hit at the heart of enterprise resource planning (ERP) systems, which handle finance, logistics, HR, and supply chains across industries. Exploitation could result in data breaches, service outages, or even manipulation of business transactions.

Global and Regional Impact

SAP powers thousands of businesses worldwide, including governments, banks, telecoms, and energy companies. For enterprises in the Middle East and Africa, where SAP plays a key role in oil & gas, aviation, and government digitization projects, delayed patching could expose critical national infrastructure to attackers.

Cybercriminals are increasingly exploiting unpatched SAP systems, often using them as entry points for ransomware campaigns or to exfiltrate sensitive financial data. In fact, threat intelligence reports suggest that attackers monitor SAP patch releases closely to weaponize new CVEs within weeks.

Expert Take

Security analysts stress that the window between patch release and exploitation is shrinking. “With CVSS 10.0 vulnerabilities on SAP NetWeaver, organizations cannot afford delays,” said a senior ERP security consultant. “Attackers know that patching SAP is complex and slow in large enterprises, which gives them an opening.”

What Security Teams Should Do Now

To mitigate risks, SAP customers should prioritize immediate patching and strengthen monitoring of their SAP landscapes.

10 Recommended Actions for Security Teams

  1. Apply all September 2025 SAP patches without delay, focusing first on CVSS 9.0+ vulnerabilities.
  2. Isolate critical SAP systems from the internet where possible to reduce attack exposure.
  3. Enable strict input validation and runtime checks for NetWeaver and ABAP components.
  4. Review access controls to prevent abuse of missing authentication and authorization flaws.
  5. Patch third-party dependencies (e.g., outdated JSON libraries and OpenSSL) used in SAP applications.
  6. Implement continuous monitoring for abnormal SAP transaction patterns.
  7. Use intrusion detection rules targeting exploitation attempts of CVE-2025-42944 and CVE-2025-42922.
  8. Strengthen staff training and awareness.
  9. Run regular vulnerability scans of SAP environments, focusing on both production and test systems.
  10. Develop a rapid incident response playbook for potential SAP exploitation scenarios.

Why This Matters for Business Leaders

This isn’t just an IT problem. With SAP at the core of financial operations, HR, and supply chains, unpatched vulnerabilities can directly translate into financial losses, compliance violations, and reputational damage. In regions like MEA, where large-scale digital transformation projects rely heavily on SAP, timely patching is critical to maintaining business trust.

Conclusion

SAP’s September 2025 Patch Day underscores the constant race between attackers and defenders. With 26 vulnerabilities addressed, including multiple critical flaws in NetWeaver and S/4HANA, organizations must treat this as a high-priority security event. Delaying patching could leave vital business systems exposed to exploitation.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here