CERTFR-2025-AVI-0674
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
SAP Landscape Transformation Landscape Transformation (Analysis Platform) versions DMIS 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020
SAP S/4HANA S/4HANA (Bank Communication Management) Versions SAP_APPL 606, SAP_FIN 617, 618, 720, 730, S4CORE 102, 103, 104, 105, 106, 107 et 108
SAP NetWeaver Application Server pour ABAP NetWeaver Application Server pour ABAP versions KRNL64UC 7.53, KERNEL versions 7.53, 7.54, 7.77, 7.89 et 7.93
SAP Business One (SLD) Business One (SLD) versions B1_ON_HANA 10.0 et SAP-M-BO 10.0
SAP NetWeaver Application Server pour ABAP NetWeaver ABAP Platform versions S4CRM 100, 200, 204, 205, 206, S4CEXT 107, 108, 109, BBPCRM 713 et 714
SAP S/4HANA S/4HANA avec le composant S4CORE versions 102, 103, 104, 105, 106, 107 et 108
SAP Cloud Connector Cloud Connector version SAP_CLOUD_CONNECTOR 2.0
SAP SAP GUI pour Windows SAP GUI pour Windows version BC-FES-GUI 8.00
SAP NetWeaver ABAP Platform NetWeaver ABAP Platform versions SAP_BASIS 758, SAP_BASIS 816 et SAP_BASIS 916
SAP Fiori Fiori (Launchpad) version SAP_UI 754
SAP NetWeaver Application Server pour ABAP NetWeaver Application Server pour ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 816, SAP_BASIS 914 et SAP_BASIS 916
SAP NetWeaver Application Server ABAP et ABAP Platform NetWeaver Application Server ABAP et ABAP Platform (Internet Communication Manager) versions KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.14, 9.15 et 9.16
SAP NetWeaver Application Server pour ABAP NetWeaver Application Server pour ABAP (BIC Document) versions S4COREOP 104, 105, 106, 107, 108, SEM-BW 600, 602, 603, 604, 605, 634, 736, 746, 747 et 748
References
Bulletin de sécurité SAP august-2025 2025-08-12 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Landscape Transformation (Analysis Platform) versions DMIS 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020",
      "product": {
        "name": "Landscape Transformation",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "S/4HANA (Bank Communication Management) Versions SAP_APPL 606, SAP_FIN 617, 618, 720, 730, S4CORE 102, 103, 104, 105, 106, 107 et 108",
      "product": {
        "name": "S/4HANA",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "NetWeaver Application Server pour ABAP versions KRNL64UC 7.53, KERNEL versions 7.53, 7.54, 7.77, 7.89 et 7.93",
      "product": {
        "name": "NetWeaver Application Server pour ABAP",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "Business One (SLD) versions B1_ON_HANA 10.0 et SAP-M-BO 10.0",
      "product": {
        "name": "Business One (SLD)",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "NetWeaver ABAP Platform versions S4CRM 100, 200, 204, 205, 206, S4CEXT 107, 108, 109, BBPCRM 713 et 714",
      "product": {
        "name": "NetWeaver Application Server pour ABAP",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "S/4HANA avec le composant S4CORE versions 102, 103, 104, 105, 106, 107 et 108",
      "product": {
        "name": "S/4HANA",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Connector version SAP_CLOUD_CONNECTOR 2.0",
      "product": {
        "name": "Cloud Connector",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "SAP GUI pour Windows version BC-FES-GUI 8.00",
      "product": {
        "name": "SAP GUI pour Windows",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "NetWeaver ABAP Platform versions SAP_BASIS 758, SAP_BASIS 816 et SAP_BASIS 916",
      "product": {
        "name": "NetWeaver ABAP Platform",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "Fiori (Launchpad) version SAP_UI 754",
      "product": {
        "name": "Fiori",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "NetWeaver Application Server pour ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 816, SAP_BASIS 914 et SAP_BASIS 916",
      "product": {
        "name": "NetWeaver Application Server pour ABAP",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "NetWeaver Application Server ABAP et ABAP Platform (Internet Communication Manager) versions KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.14, 9.15 et 9.16",
      "product": {
        "name": "NetWeaver Application Server ABAP et ABAP Platform",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    },
    {
      "description": "NetWeaver Application Server pour ABAP (BIC Document) versions S4COREOP 104, 105, 106, 107, 108, SEM-BW 600, 602, 603, 604, 605, 634, 736, 746, 747 et 748",
      "product": {
        "name": "NetWeaver Application Server pour ABAP",
        "vendor": {
          "name": "SAP",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-42943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42943"
    },
    {
      "name": "CVE-2025-42975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42975"
    },
    {
      "name": "CVE-2025-42945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42945"
    },
    {
      "name": "CVE-2025-42950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42950"
    },
    {
      "name": "CVE-2025-42936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42936"
    },
    {
      "name": "CVE-2025-42949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42949"
    },
    {
      "name": "CVE-2025-42946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42946"
    },
    {
      "name": "CVE-2025-42934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42934"
    },
    {
      "name": "CVE-2025-42955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42955"
    },
    {
      "name": "CVE-2025-42935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42935"
    },
    {
      "name": "CVE-2025-42948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42948"
    },
    {
      "name": "CVE-2025-42976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42976"
    },
    {
      "name": "CVE-2025-42957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42957"
    },
    {
      "name": "CVE-2025-42951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42951"
    },
    {
      "name": "CVE-2025-42941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42941"
    },
    {
      "name": "CVE-2025-42942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-42942"
    }
  ],
  "initial_release_date": "2025-08-12T00:00:00",
  "last_revision_date": "2025-08-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0674",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP",
  "vendor_advisories": [
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SAP august-2025",
      "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/august-2025.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…