此页面尚未翻译为您的语言。我们正在努力翻译,目前显示英文内容。

💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.

MEDIUMCVE-2025-42895CVSS 6.9

CVE-2025-42895: Code Loading in SAP HANA JDBC Client

平台

java

组件

sap-hana-jdbc-client

修复版本

2.0.1

正在翻译为您的语言…

CVE-2025-42895 affects the SAP HANA JDBC Client, specifically versions 2.0–HDB_CLIENT 2.0. This vulnerability stems from insufficient validation of connection property values, enabling a local, high-privilege user to potentially load unauthorized code. The impact primarily affects the availability of the application, though confidentiality and integrity are also at risk. The vulnerability was published on November 11, 2025, and a fix is available in version 2.0.1.

Java / Maven

检测此 CVE 是否影响你的项目

上传你的 pom.xml 文件,立即知道是否受影响。

上传 pom.xml支持的格式: pom.xml · build.gradle

影响与攻击场景翻译中…

An attacker exploiting CVE-2025-42895 could leverage their high-privilege local access to craft malicious connection property parameters. These parameters, due to the lack of proper validation, could be used to load arbitrary code into the SAP HANA JDBC Client process. Successful exploitation could lead to a denial-of-service (DoS) condition, rendering the application unavailable. While the direct impact on confidentiality and integrity is considered low, the ability to execute code within the client process opens the door to further attacks, potentially allowing an attacker to escalate privileges or exfiltrate sensitive data stored within the SAP HANA database. The blast radius extends to any application relying on the vulnerable JDBC client to connect to the SAP HANA database.

利用背景翻译中…

The exploitation context for CVE-2025-42895 is currently unclear. No public proof-of-concept (POC) code has been released. The vulnerability's severity is rated as medium, suggesting a moderate probability of exploitation. It is not listed on the KEV catalog or EPSS. Further monitoring of security advisories and threat intelligence feeds is recommended to assess the evolving risk.

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.03% (10% 百分位)

CISA SSVC

利用情况none
可自动化no
技术影响partial

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:H6.9MEDIUMAttack VectorLocal攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredHigh攻击所需的认证级别User InteractionRequired是否需要受害者采取行动ScopeChanged超出受影响组件的影响范围ConfidentialityLow敏感数据泄露风险IntegrityLow数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
本地 — 攻击者需要系统上的本地会话或Shell。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
高 — 需要管理员或特权账户。
User Interaction
需要 — 受害者必须打开文件、点击链接或访问特制页面。
Scope
已改变 — 攻击可以超出脆弱组件,影响其他系统。
Confidentiality
低 — 可访问部分数据。
Integrity
低 — 攻击者可修改部分数据,影响有限。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件sap-hana-jdbc-client
供应商SAP_SE
最低版本2.0
最高版本HDB_CLIENT 2.0
修复版本2.0.1

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. 修改日期
  4. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2025-42895 is to upgrade the SAP HANA JDBC Client to version 2.0.1 or later. If an immediate upgrade is not feasible, consider implementing stricter access controls to limit the privileges of local users. Review and restrict connection property configurations to prevent the injection of malicious parameters. While a direct WAF rule is unlikely to be effective, monitoring network traffic for unusual connection attempts or code loading activity could provide early warning signs. After upgrading, confirm the fix by attempting to establish a connection with crafted parameters known to trigger the vulnerability; the connection should fail with an appropriate error message.

修复方法翻译中…

Actualice el SAP HANA JDBC Client a la última versión disponible proporcionada por SAP. Consulte la nota SAP 3643385 para obtener más detalles e instrucciones específicas sobre la actualización.

常见问题翻译中…

What is CVE-2025-42895 — Code Loading in SAP HANA JDBC Client?

CVE-2025-42895 is a medium severity vulnerability in the SAP HANA JDBC Client (versions 2.0–HDB_CLIENT 2.0) that allows a local, high-privilege user to load unauthorized code due to insufficient validation, impacting application availability.

Am I affected by CVE-2025-42895 in SAP HANA JDBC Client?

You are affected if you are using SAP HANA JDBC Client versions 2.0–HDB_CLIENT 2.0. Check your system's version and upgrade if necessary.

How do I fix CVE-2025-42895 in SAP HANA JDBC Client?

Upgrade the SAP HANA JDBC Client to version 2.0.1 or later to resolve the vulnerability. If immediate upgrade is not possible, restrict access controls and review connection property configurations.

Is CVE-2025-42895 being actively exploited?

Currently, there is no public evidence of active exploitation. However, the vulnerability's severity warrants ongoing monitoring and proactive mitigation.

Where can I find the official SAP advisory for CVE-2025-42895?

Refer to the official SAP Security Notes and Advisories for detailed information and guidance regarding CVE-2025-42895. Check the SAP Support Portal for the latest updates.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。

Java / Maven

检测此 CVE 是否影响你的项目

上传你的 pom.xml 文件,立即知道是否受影响。

上传 pom.xml支持的格式: pom.xml · build.gradle
live免费扫描

立即扫描您的Java / Maven项目 — 无需账户

Upload your pom.xml and get the vulnerability report instantly. No account. Uploading the file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.

手动扫描Slack/邮件提醒持续监控白标报告

拖放您的依赖文件

composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...