Plataforma
sap
Componente
sap-crm-and-sap-s-4hana-interaction-center
Corregido en
4.0.1
200.0.1
204.0.1
205.0.1
206.0.1
4.0.1
103.0.1
104.0.1
105.0.1
106.0.1
107.0.1
108.0.1
4.0.1
701.0.1
702.0.1
712.0.1
713.0.1
714.0.1
701.0.1
731.0.1
746.0.1
747.0.1
748.0.1
800.0.1
801.0.1
CVE-2025-27430 describes a Server-Side Request Forgery (SSRF) vulnerability affecting SAP CRM and SAP S/4HANA (Interaction Center) components. This vulnerability allows an attacker with low privileges to send requests to internal network resources, potentially exposing sensitive information. The vulnerability impacts versions of the product up to and including WEBCUIF 701. A patch is available, resolving the issue.
The SSRF vulnerability in SAP CRM and S/4HANA allows an attacker to craft malicious requests that originate from the server itself. This bypasses typical network security controls, enabling access to internal resources that would normally be inaccessible from the outside. Successful exploitation could lead to the exposure of sensitive data stored on internal systems, such as configuration files, database credentials, or proprietary business information. While the vulnerability does not directly impact data integrity or availability, the confidentiality breach can have significant consequences, including compliance violations and reputational damage. The low privilege requirement makes this vulnerability particularly concerning, as it reduces the barrier to entry for potential attackers.
CVE-2025-27430 was publicly disclosed on March 11, 2025. The CVSS score of 3.5 (LOW) indicates a relatively low probability of exploitation, but the potential impact on confidentiality should not be underestimated. There are currently no publicly available proof-of-concept exploits. It is not listed on the CISA KEV catalog as of this writing. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns targeting this vulnerability.
Organizations deploying SAP CRM and SAP S/4HANA (Interaction Center) with versions up to WEBCUIF 701 are at risk. This includes companies heavily reliant on these platforms for customer relationship management and internal communication. Shared hosting environments where multiple tenants share the same SAP instance are particularly vulnerable, as a compromise of one tenant could potentially lead to SSRF attacks targeting other tenants’ internal resources.
• sap: Review SAP system logs for unusual outbound network requests originating from the Interaction Center component. Look for requests to internal IP addresses or services.
# Example: Check SAP logs for requests to internal IP addresses
zgrep '192.168.1.' /opt/sap/your_sap_instance/log/system.log• linux / server: Use ss or lsof to monitor outbound network connections from the SAP CRM/S/4HANA process. Filter for connections to internal IP addresses.
# Example: List all connections from the SAP CRM process
ss -p | grep sapcrm• generic web: Examine access and error logs for requests containing suspicious URLs or internal IP addresses.
# Example: grep for requests to internal IPs in access logs
grep '192.168.1.' /var/log/apache2/access.logdisclosure
Estado del Exploit
EPSS
0.06% (19% percentil)
CISA SSVC
Vector CVSS
The primary mitigation for CVE-2025-27430 is to upgrade to version 701.0.1 or later. Prior to upgrading, it's crucial to review SAP's official documentation for compatibility and potential breaking changes. If an immediate upgrade is not feasible, consider implementing temporary workarounds such as restricting outbound network access from the affected component using a Web Application Firewall (WAF) or proxy server. Configure the WAF to block requests to internal IP addresses or specific internal services. Regularly monitor system logs for suspicious outbound requests originating from the SAP CRM/S/4HANA component. After upgrading, confirm the fix by attempting to trigger the SSRF vulnerability and verifying that the request is blocked or redirected.
Aplicar las actualizaciones de seguridad proporcionadas por SAP. Consultar la nota SAP 3561861 para obtener información detallada sobre la solución y las versiones corregidas. Se recomienda actualizar a la versión más reciente disponible.
Análisis de vulnerabilidades y alertas críticas directamente en tu correo.
CVE-2025-27430 is a Server-Side Request Forgery vulnerability in SAP CRM and SAP S/4HANA (Interaction Center) allowing attackers to access internal resources. It has a CVSS score of 3.5 (LOW).
You are affected if you are using SAP CRM and SAP S/4HANA (Interaction Center) versions up to and including WEBCUIF 701.
Upgrade to version 701.0.1 or later. Implement WAF rules to restrict outbound network access as a temporary workaround.
There are currently no publicly available proof-of-concept exploits or confirmed reports of active exploitation.
Refer to the official SAP Security Notes for details and remediation guidance. Check the SAP Support Portal for the latest advisory.
Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.