HIGHCVE-2025-23186CVSS 8.5

通过远程函数调用 (RFC) 在 SAP NetWeaver Application Server ABAP 中存在混合动态 RFC 目标漏洞

平台

sap

组件

sap-netweaver-application-server-abap

修复版本

64.0.1

7.22.1

64.0.1

7.53.1

7.22.1

7.54.1

7.77.1

7.89.1

7.93.1

AI Confidence: highNVDEPSS 0.2%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2025-23186 describes a Remote Function Call (RFC) vulnerability in SAP NetWeaver Application Server ABAP. This flaw allows an authenticated attacker to craft malicious RFC requests, potentially exposing credentials for remote services. The vulnerability impacts versions of SAP NetWeaver Application Server ABAP up to and including KRNL64UC 7.22. A patch is available from SAP to address this issue.

影响与攻击场景翻译中…

Successful exploitation of CVE-2025-23186 can lead to a complete compromise of the targeted remote service. By crafting a specific RFC request, an attacker can bypass security controls and obtain credentials that would otherwise be inaccessible. These credentials can then be leveraged to gain unauthorized access, modify data, or disrupt service operations. The potential impact extends beyond the immediate application, as compromised credentials could be used for lateral movement within the SAP environment and potentially to other connected systems. This vulnerability shares similarities with other RFC-based privilege escalation attacks, highlighting the importance of strict access controls and input validation.

利用背景翻译中…

CVE-2025-23186 was publicly disclosed on April 8, 2025. Exploitation probability is currently assessed as medium, given the authentication requirement and the need for crafting specific RFC requests. Public proof-of-concept exploits are not yet widely available, but the vulnerability's nature suggests it could be readily exploited once a PoC is released. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns.

哪些人处于风险中翻译中…

Organizations heavily reliant on SAP NetWeaver Application Server ABAP for critical business processes are particularly at risk. Environments with weak access controls or inadequate network segmentation are also more vulnerable. Shared hosting environments where multiple tenants share the same SAP instance should be carefully assessed for potential cross-tenant exposure.

检测步骤翻译中…

• linux / server:

journalctl -u sapstartsrv | grep RFC

• generic web:

curl -I <rfc_endpoint>

• database (mysql, redis, mongodb, postgresql): N/A - This vulnerability is not directly related to database systems. • windows / supply-chain: N/A - This vulnerability is not directly related to Windows systems. • wordpress / composer / npm: N/A - This vulnerability is not directly related to web application frameworks.

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.21% (43% 百分位)

CISA SSVC

利用情况none
可自动化no
技术影响total

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H8.5HIGHAttack VectorNetwork攻击者如何到达目标Attack ComplexityHigh利用漏洞所需的条件Privileges RequiredLow攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeChanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityHigh数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
高 — 需要竞态条件、非默认配置或特定情况。难以可靠利用。
Privileges Required
低 — 任何有效用户账户均可。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
已改变 — 攻击可以超出脆弱组件,影响其他系统。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
高 — 攻击者可写入、修改或删除任何数据。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件sap-netweaver-application-server-abap
供应商SAP_SE
影响范围修复版本
KRNL64NUC 7.22 – KRNL64NUC 7.2264.0.1
7.22EXT – 7.22EXT7.22.1
KRNL64UC 7.22 – KRNL64UC 7.2264.0.1
7.53 – 7.537.53.1
KERNEL 7.22 – KERNEL 7.227.22.1
7.54 – 7.547.54.1
7.77 – 7.777.77.1
7.89 – 7.897.89.1
7.93 – 7.937.93.1

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. 修改日期
  4. EPSS 更新日期
未修复 — 披露已411天

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2025-23186 is to upgrade to a patched version of SAP NetWeaver Application Server ABAP. Refer to the official SAP security note for the specific fixed version. If immediate patching is not feasible, consider implementing stricter access controls on RFC destinations to limit the potential attack surface. Implement network segmentation to restrict access to RFC services from untrusted networks. Monitor RFC activity for suspicious patterns and unauthorized access attempts. After upgrading, verify the fix by attempting to trigger the vulnerable RFC call with a modified request and confirming that the authentication mechanism remains secure.

修复方法翻译中…

Aplique las actualizaciones o parches proporcionados por SAP para corregir la vulnerabilidad de llamada a función remota (RFC) en SAP NetWeaver Application Server ABAP. Consulte la nota SAP 3554667 para obtener más detalles e instrucciones específicas sobre cómo aplicar la solución.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2025-23186 — RFC Credential Exposure in SAP NetWeaver?

CVE-2025-23186 is a HIGH severity vulnerability in SAP NetWeaver Application Server ABAP allowing authenticated attackers to expose credentials via crafted RFC requests, potentially leading to remote service compromise.

Am I affected by CVE-2025-23186 in SAP NetWeaver?

You are affected if you are running SAP NetWeaver Application Server ABAP versions up to and including KRNL64UC 7.22. Check your version and apply the recommended patch.

How do I fix CVE-2025-23186 in SAP NetWeaver?

Upgrade to a patched version of SAP NetWeaver Application Server ABAP as specified in the official SAP security note. Implement stricter access controls and network segmentation as interim measures.

Is CVE-2025-23186 being actively exploited?

While no confirmed active exploitation campaigns have been publicly reported, the vulnerability's nature suggests it could be readily exploited once a proof-of-concept is released. Monitoring is advised.

Where can I find the official SAP advisory for CVE-2025-23186?

Refer to the official SAP Security Notes published on the SAP Support Portal for detailed information and the corresponding patch: [https://www.sap.com/security/support.html](https://www.sap.com/security/support.html)

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。