fkie_cve-2025-0066
Vulnerability from fkie_nvd
Published
2025-01-14 01:15
Modified
2025-10-23 19:06
Severity ?
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Under certain conditions SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Framework) allows an attacker to access restricted information due to weak access controls. This can have a significant impact on the confidentiality, integrity, and availability of an application
References
| URL | Tags | ||
|---|---|---|---|
| cna@sap.com | https://me.sap.com/notes/3550708 | Permissions Required | |
| cna@sap.com | https://url.sap/sapsecuritypatchday | Patch |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| sap | sap_basis | 700 | |
| sap | sap_basis | 701 | |
| sap | sap_basis | 702 | |
| sap | sap_basis | 731 | |
| sap | sap_basis | 740 | |
| sap | sap_basis | 750 | |
| sap | sap_basis | 751 | |
| sap | sap_basis | 752 | |
| sap | sap_basis | 753 | |
| sap | sap_basis | 754 | |
| sap | sap_basis | 755 | |
| sap | sap_basis | 756 | |
| sap | sap_basis | 757 | |
| sap | sap_basis | 758 | |
| sap | sap_basis | 912 | |
| sap | sap_basis | 913 | |
| sap | sap_basis | 914 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sap:sap_basis:700:*:*:*:*:*:*:*",
"matchCriteriaId": "85616273-040E-49CB-8EB6-D2D4D7B603E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:701:*:*:*:*:*:*:*",
"matchCriteriaId": "C5F2C3A9-DCC0-4FF1-8E68-9EA150E209F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:702:*:*:*:*:*:*:*",
"matchCriteriaId": "6F774A45-2A9F-4873-A5DC-766D030C8CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:731:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A0A2D6-9259-4A35-A236-F4BEE986C1FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:740:*:*:*:*:*:*:*",
"matchCriteriaId": "49C3A8E5-FA6A-4EF3-BF50-FD4E1576024F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:750:*:*:*:*:*:*:*",
"matchCriteriaId": "ABA8AB4E-3FE6-46A8-847E-660C5DF6CE71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:751:*:*:*:*:*:*:*",
"matchCriteriaId": "6DA4A6F0-C0F1-42CB-8BBD-7198064733EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:752:*:*:*:*:*:*:*",
"matchCriteriaId": "8C121CC9-26F6-4103-8EB0-BAFF6B5B5FE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:753:*:*:*:*:*:*:*",
"matchCriteriaId": "86086D00-10BF-4C55-8D87-82CCBE468153",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:754:*:*:*:*:*:*:*",
"matchCriteriaId": "2F25246A-D9E5-4F0D-B91A-478D4E5570DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:755:*:*:*:*:*:*:*",
"matchCriteriaId": "0218695F-C4AD-46BF-B176-F10C644A9C2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:756:*:*:*:*:*:*:*",
"matchCriteriaId": "FC9E7C3E-1005-450A-9198-E014C1BAADBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:757:*:*:*:*:*:*:*",
"matchCriteriaId": "3A177AB1-CC85-46EF-91DF-462096608C9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:758:*:*:*:*:*:*:*",
"matchCriteriaId": "F7591F81-708C-4285-9BB2-F2B4BDB9759B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:912:*:*:*:*:*:*:*",
"matchCriteriaId": "186B1AB2-9345-450B-BBE2-14F0F650AAF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:913:*:*:*:*:*:*:*",
"matchCriteriaId": "2C4A728A-DCF9-42A2-AB32-620885A0CEC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sap:sap_basis:914:*:*:*:*:*:*:*",
"matchCriteriaId": "21CA6E71-AD1B-424B-9254-13785DC9F9F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Under certain conditions SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Framework) allows an attacker to access restricted information due to weak access controls. This can have a significant impact on the confidentiality, integrity, and availability of an application"
},
{
"lang": "es",
"value": " En determinadas circunstancias, SAP NetWeaver AS para ABAP y la plataforma ABAP (Internet Communication Framework) permite a un atacante acceder a informaci\u00f3n restringida debido a controles de acceso d\u00e9biles. Esto puede tener un impacto significativo en la confidencialidad, integridad y disponibilidad de una aplicaci\u00f3n."
}
],
"id": "CVE-2025-0066",
"lastModified": "2025-10-23T19:06:57.513",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0,
"source": "cna@sap.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-01-14T01:15:16.783",
"references": [
{
"source": "cna@sap.com",
"tags": [
"Permissions Required"
],
"url": "https://me.sap.com/notes/3550708"
},
{
"source": "cna@sap.com",
"tags": [
"Patch"
],
"url": "https://url.sap/sapsecuritypatchday"
}
],
"sourceIdentifier": "cna@sap.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "cna@sap.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…