Home

Description

Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The system may be vulnerable when specially crafted input is used to exploit the vulnerability resulting in high impact on confidentiality, integrity and availability of the system.

PUBLISHED Reserved 2025-04-16 | Published 2025-12-09 | Updated 2025-12-10 | Assigner sap




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

Default status
unaffected

SYBASE_SOFTWARE_DEVELOPER_KIT 16.0.4
affected

16.1
affected

References

me.sap.com/notes/3685286

url.sap/sapsecuritypatchday

cve.org (CVE-2025-42928)

nvd.nist.gov (CVE-2025-42928)

Download JSON