Schedule Demo
SAP Security Patch Tuesday August 2025 -3 Critical RCEs & 15 Notes
4-min read
Published: 08.12.2025
|
Updated: 08.12.2025

SAP has released 15 new Security Notes as part of the August 12, 2025 Patch Day, along with 4 updates to previously released notes. This month’s release addresses critical vulnerabilities in S/4HANA, Landscape Transformation, and Business One, including three remote code execution (RCE) flaws with CVSS scores of 9.9.

The most urgent issues relate to code injection vulnerabilities via RFC-exposed function modules, posing a significant risk of system compromise, data breach, and privilege escalation.

Critical Vulnerabilities (CVSS 9.9): Triple Code Injection Threat

CVE-2025-27429 – Code Injection via RFC in S/4HANA

Security Note #3581961 (CVSS 9.9):
An attacker with low privileges can inject arbitrary ABAP code into systems via RFC function modules in the Landscape Transformation stack. The vulnerability allows full system compromise, impacting confidentiality, integrity, and availability.

Recommendation: Apply this patch immediately across all S/4HANA systems using CA-LT-ANA.

CVE-2025-42950 – Code Injection in SAP Landscape Transformation

Security Note #3633838 (CVSS 9.9):
Same core vulnerability as above, but found in systems using SAP Landscape Transformation (SLT) Analysis Platform. Exploitation leads to remote ABAP execution and potentially full system takeover.

Recommendation: Patch SLT and restrict RFC access to transformation modules.

CVE-2025-42957 – Code Injection in S/4HANA Analytics

Security Note #3627998 (CVSS 9.9):
Affects the analytics transformation layer in S/4HANA. Malicious input through RFC interfaces allows arbitrary code injection with high privileges.

Recommendation: Treat as emergency patch. Apply across all analytical/data transformation endpoints.

High Priority Notes

CVE-2025-42951 – Broken Authorization in SAP Business One (SLD)

Security Note #3625403 (CVSS 8.8):
Normal users can invoke SLD APIs and gain administrator privileges. This exposes sensitive credentials and can lead to system-wide privilege escalation.

Action: Patch immediately. Ensure only B1SiteUser is permitted to perform SLD operations.

CVE-2025-42976 / CVE-2025-42975 – Memory Corruption & Reflected XSS in NetWeaver ABAP (BIC Document)

Security Note #3611184 (CVSS 8.1 & 6.1):
Crafted requests can crash SAP NetWeaver or expose memory-resident data. Also includes an unauthenticated XSS vector that can steal session context from browser clients.

Mitigation: Apply patch. If delayed, temporarily deactivate SICF service /sap/bw/BIC.

CVE-2025-42946 – Directory Traversal in S/4HANA (Bank Comm Management)

Security Note #3614804 (CVSS 6.9):
High-privileged users can access and delete arbitrary OS-level files through improperly validated paths.

Risk: Confidentiality and integrity impacted. Apply patch promptly.

Medium Priority Notes

CVEComponentCVSSType
CVE-2025-42948CRM Email Management6.1Stored XSS
CVE-2025-42942NetWeaver ICF6.1Reflected XSS
CVE-2025-42945SAP GUI for HTML6.1HTML Injection
CVE-2025-42935NetWeaver ICM4.1Token Logging
CVE-2025-42934S/4HANA Supplier Invoice4.3CRLF Injection
CVE-2025-42943SAP GUI for Windows4.5NTLM Hash Disclosure
CVE-2025-42949ABAP SQL Console4.9Privilege Escalation
CVE-2025-42955SAP Cloud Connector3.5Auth Check Missing

Guidance: Integrate these into your normal update cycles based on component exposure and business impact.

Updated Security Notes (4)

CVENoteReason
CVE-2025-274293581961Re-classified as critical with updated patch scope
CVE-2025-42976/429753611184Expanded CVEs and enhanced remediation
CVE-2025-231943561792Portal patch updates for more SP levels
CVE-2025-313313577131Revised correction instructions

Summary Table

SeverityCountNotable Components
Critical (CVSS 9.9) 3S/4HANA, LT, Analytics
High (8.1–8.8) 3Business One, NetWeaver BIC
Medium (< 8.0) 9CRM, GUI, ICF, Cloud Connector, ABAP Console

Patching & Mitigation Recommendations

Critical

  • Deploy patches for CVE-2025-27429, 42950, and 42957 immediately.
  • Restrict access to RFC-exposed function modules in custom and standard code.

High Priority

  • Patch Business One SLD and NetWeaver BIC services.
  • Deactivate vulnerable services (like /sap/bw/BIC) if patching is delayed.

Medium Priority

  • Disable or restrict GUI input history, UNC path access, and ICM logging formats.
  • Patch GUI and ICF components as part of the next planned window.

General

  • Review SACF (SAP Authorization Concept Framework) policies for RFCs.
  • Monitor logs for abuse of SQL Console, ICF services, and GUI input anomalies.
  • Consider temporary network segmentation for critical SAP services if risk persists.

Final Thoughts

August 2025 Patch Day represents the most severe release this year in terms of RCE risk. Three separate CVEs with CVSS 9.9 highlight the fragility of RFC-exposed modules — often overlooked yet central to SAP integration.

Action Plan for SAP Security Teams:

  1. Immediately deploy fixes for CVE-2025-27429, 42950, and 42957.
  2. Patch high-risk systems like Business One, NetWeaver BIC, and SLT environments.
  3. Assess internal RFC exposure, especially in custom code.
  4. Use SACF, logging, and external monitoring to harden RFC entry points.
  5. Maintain momentum in patching medium-rated vulnerabilities.

The simplicity of these attacks — combined with their deep system reach — calls for immediate response and strong defense.