Plataforma
sap
Componente
sap-s-4hana-cloud-private-edition-or-on-premise-scm-master-data-layer-mdl
Corrigido em
4.0.1
103.0.1
104.0.1
105.0.1
106.0.1
107.0.1
108.0.1
700.0.1
701.0.1
702.0.1
712.0.1
713.0.1
714.0.1
CVE-2025-43010 describes a Remote Code Execution (RCE) vulnerability within the SAP S/4HANA Cloud Private Edition or On Premise (SCM Master Data Layer (MDL)). This flaw allows an authenticated attacker with standard SAP authorization to remotely execute a function module and replace arbitrary ABAP programs. The vulnerability impacts versions of SCM_BASIS up to and including 700, posing a significant risk to data integrity and application availability. A patch is available in version 700.0.1.
The impact of CVE-2025-43010 is substantial. An attacker who successfully exploits this vulnerability can replace critical ABAP programs, effectively gaining control over the application's behavior. This could lead to data corruption, unauthorized modifications to business processes, and even complete system takeover. The ability to replace standard SAP programs elevates the risk, as attackers can inject malicious code directly into the core functionality of the system. The vulnerability's low confidentiality impact is overshadowed by the high integrity and availability risks, making it a priority for remediation.
CVE-2025-43010 was publicly disclosed on May 13, 2025. Its exploitation context is currently unclear, with no known active campaigns or public proof-of-concept (POC) code available. The vulnerability is not listed on the CISA KEV catalog as of this writing. Given the potential for significant impact, organizations should prioritize patching to prevent potential exploitation.
Organizations utilizing SAP S/4HANA Cloud Private Edition or On Premise (SCM Master Data Layer (MDL)) with versions up to 700 are at risk. This includes businesses heavily reliant on SAP for supply chain management (SCM) processes and those with legacy configurations that haven't been regularly updated. Shared hosting environments utilizing these SAP components are also particularly vulnerable due to the potential for cross-tenant exploitation.
• linux / server:
journalctl -u <sap_service_name> | grep -i "function module"• generic web:
curl -I <sap_endpoint> | grep -i "ABAP"disclosure
Status do Exploit
EPSS
0.23% (percentil 46%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2025-43010 is to upgrade to SAP S/4HANA Cloud Private Edition or On Premise (SCM Master Data Layer (MDL)) version 700.0.1 or later. If an immediate upgrade is not feasible, consider implementing strict access controls to limit the number of users with standard SAP authorization. Review and restrict the permissions granted to function modules to minimize the potential attack surface. While a WAF or proxy cannot directly prevent this vulnerability, it can help detect and block suspicious activity related to ABAP program manipulation. After upgrading, confirm the fix by attempting to execute the vulnerable function module with a non-administrative user and verifying that the program replacement is prevented.
Aplique las actualizaciones de seguridad proporcionadas por SAP para corregir la vulnerabilidad de inyección de código. Consulte la nota SAP 3600859 para obtener más detalles e instrucciones específicas sobre cómo aplicar el parche correspondiente a su versión de SAP S/4HANA. Asegúrese de validar la correcta aplicación del parche en un entorno de pruebas antes de implementarlo en producción.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2025-43010 is a Remote Code Execution vulnerability in SAP S/4HANA Cloud Private Edition allowing authenticated attackers to replace ABAP programs, impacting integrity and availability.
You are affected if you are using SAP S/4HANA Cloud Private Edition or On Premise (SCM Master Data Layer (MDL)) versions ≤700.
Upgrade to SAP S/4HANA Cloud Private Edition version 700.0.1 or later. Implement stricter access controls as a temporary workaround.
There are currently no confirmed reports of active exploitation, but the vulnerability's potential impact warrants immediate attention.
Refer to the official SAP Security Notes for detailed information and remediation steps. Check the SAP Support Portal for the latest advisory.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.