
Cloud Vulnerability DB
A community-led vulnerabilities database
A memory corruption vulnerability (CVE-2025-42902) was discovered in SAP NetWeaver AS ABAP and ABAP Platform. The vulnerability, disclosed on October 13, 2025, allows unauthenticated attackers to send corrupted SAP Logon Tickets or SAP Assertion Tickets to the SAP application server, leading to server process crashes (NVD, GBHackers).
The vulnerability stems from a NULL Pointer Dereference (CWE-476) during ticket parsing. When the application server processes a corrupted ticket, it attempts to access memory at a NULL pointer location, resulting in a work process crash. The flaw has been assigned a CVSS 3.1 Base Score of 5.3 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L. Affected versions include multiple kernel builds from 7.22 through 9.16 (GBHackers).
The vulnerability impacts system availability while maintaining confidentiality and integrity. When exploited, it causes work process crashes, and repeated ticket submissions can potentially lead to denial-of-service conditions. The impact is particularly concerning as it affects both SAP NetWeaver AS ABAP and the broader ABAP Platform across multiple versions (NVD, GBHackers).
SAP has released security note 3627308 and patches as part of its October 2025 patch day. As a temporary workaround, organizations can block incoming ticket parsing by disabling external logon ticket acceptance on the SAP ICM component, though this may disrupt legitimate federated logins. Additional recommended measures include regular security posture reviews and network-level filtering of SAP interfaces (GBHackers).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."