MEDIUMCVE-2025-43001CVSS 6.9

Multiple Privilege Escalation Vulnerabilities in SAPCAR

wordt vertaald…

Platform

sap

Component

sapcar

Opgelost in

7.53.1

7.22.1

AI Confidence: highNVDEPSS 0.0%Beoordeeld: mei 2026
Wordt vertaald naar uw taal…

CVE-2025-43001 is a privilege escalation vulnerability affecting SAPCAR versions up to 7.53. An attacker with high privileges can exploit this flaw to override directory permissions during archive extraction. Successful exploitation could allow modification of critical files, potentially compromising system integrity, despite signature verification remaining intact. A patch is expected to resolve this issue.

Impact en Aanvalsscenarioswordt vertaald…

The primary impact of CVE-2025-43001 lies in the potential for privilege escalation. An attacker, already possessing high-level access, can leverage this vulnerability to manipulate the permissions of directories and files during the SAPCAR archive extraction process. This allows them to modify files, even those protected by digital signatures, without invalidating the signature itself. The attacker could, for example, replace legitimate system binaries with malicious versions, leading to complete system compromise. While the vulnerability's impact on confidentiality and availability is considered low, the ability to tamper with critical files presents a significant integrity risk. The blast radius extends to any system where SAPCAR is used and vulnerable versions are deployed, particularly those handling sensitive data or critical infrastructure.

Uitbuitingscontextwordt vertaald…

CVE-2025-43001 was published on 2025-07-08. The vulnerability's exploitation probability is currently being evaluated, but given the privilege escalation nature and potential for signature bypass, it warrants attention. No public Proof-of-Concept (POC) exploits are currently known, but the potential for abuse is significant. Monitor security advisories from SAP for updates and patch releases. The CVSS score of 6.9 (MEDIUM) indicates a moderate level of severity and potential for exploitation.

Dreigingsinformatie

Exploit Status

Proof of ConceptOnbekend
CISA KEVNO
InternetblootstellingLaag

EPSS

0.01% (2% percentiel)

CISA SSVC

Exploitatienone
Automatiseerbaarno
Technische Impacttotal

CVSS-vector

DREIGINGSINFORMATIE· CVSS 3.1CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:L6.9MEDIUMAttack VectorLocalHoe de aanvaller het doel bereiktAttack ComplexityLowVereiste omstandigheden om te exploiterenPrivileges RequiredHighVereist authenticatieniveau voor aanvalUser InteractionRequiredOf het slachtoffer actie moet ondernemenScopeChangedImpact buiten het getroffen onderdeelConfidentialityLowRisico op blootstelling van gevoelige dataIntegrityHighRisico op ongeautoriseerde gegevenswijzigingAvailabilityLowRisico op verstoring van dienstennextguardhq.com · CVSS v3.1 Basisscore
Wat betekenen deze metrics?
Attack Vector
Lokaal — aanvaller heeft een lokale sessie of shell op het systeem nodig.
Attack Complexity
Laag — geen speciale voorwaarden vereist. Betrouwbaar uitbuitbaar.
Privileges Required
Hoog — beheerder of geprivilegieerd account vereist.
User Interaction
Vereist — slachtoffer moet een bestand openen, op een link klikken of een pagina bezoeken.
Scope
Gewijzigd — aanval kan voorbij het kwetsbare component uitbreiden naar andere systemen.
Confidentiality
Laag — gedeeltelijke toegang tot enkele gegevens.
Integrity
Hoog — aanvaller kan alle gegevens schrijven, aanpassen of verwijderen.
Availability
Laag — gedeeltelijke of intermitterende denial of service.

Getroffen Software

Componentsapcar
LeverancierSAP_SE
Getroffen bereikOpgelost in
SAP_CAR 7.53 – SAP_CAR 7.537.53.1
7.22EXT – 7.22EXT7.22.1

Zwakheidsclassificatie (CWE)

Tijdlijn

  1. Gereserveerd
  2. Gepubliceerd
  3. Gewijzigd
  4. EPSS bijgewerkt
Geen patch — 320 dagen na openbaarmaking

Mitigatie en Workaroundswordt vertaald…

The primary mitigation for CVE-2025-43001 is to upgrade SAPCAR to a patched version as soon as it becomes available. Until a patch is released, consider implementing temporary workarounds. Restrict access to SAPCAR functionality to only authorized users with a strict need-to-know basis. Implement robust file integrity monitoring (FIM) to detect unauthorized modifications to critical files. Review and strengthen existing access control policies to minimize the potential impact of a successful exploit. Consider using a Web Application Firewall (WAF) or proxy to filter potentially malicious archive uploads, although this may not be a complete solution. After upgrading, verify the fix by attempting to extract a test archive and confirming that directory permissions remain unchanged.

Hoe te verhelpenwordt vertaald…

Actualice SAPCAR a una versión parcheada o posterior. Consulte la nota SAP 3595143 para obtener más detalles e instrucciones específicas sobre cómo aplicar la solución.

CVE Beveiligingsnieuwsbrief

Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.

Veelgestelde vragenwordt vertaald…

What is CVE-2025-43001 — Privilege Escalation in SAPCAR?

It's a privilege escalation vulnerability in SAPCAR versions up to 7.53, allowing attackers to modify files during archive extraction despite signature verification.

Am I affected by CVE-2025-43001 in SAPCAR?

If you are using SAPCAR version 7.53 or earlier, you are potentially affected by this vulnerability. Check your SAPCAR version immediately.

How do I fix CVE-2025-43001 in SAPCAR?

Upgrade to a patched version of SAPCAR as soon as a patch is released by SAP. Until then, implement temporary workarounds like access restrictions and file integrity monitoring.

Is CVE-2025-43001 being actively exploited?

No public exploits are currently known, but the potential for exploitation is significant due to the privilege escalation nature of the vulnerability.

Where can I find the official SAPCAR advisory for CVE-2025-43001?

Refer to SAP security advisories and the National Vulnerability Database (NVD) entry for CVE-2025-43001 for the latest information.

Is jouw project getroffen?

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.