We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-42943

Information Disclosure in SAP GUI for Windows



Description

SAP GUI for Windows may allow the leak of NTML hashes when specific ABAP frontend services are called with UNC paths. For a successful attack, the attacker needs developer authorization in a specific Application Server ABAP to make changes in the code, and the victim needs to execute by using SAP GUI for Windows. This could trigger automatic NTLM authentication, potentially exposing hashed credentials to an attacker. As a result, it has a high impact on the confidentiality.

Reserved 2025-04-16 | Published 2025-08-12 | Updated 2025-08-12 | Assigner sap


MEDIUM: 4.5CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-250: Execution with Unnecessary Privileges

Product status

Default status
unaffected

BC-FES-GUI 8.00
affected

References

me.sap.com/notes/3627845

url.sap/sapsecuritypatchday

cve.org (CVE-2025-42943)

nvd.nist.gov (CVE-2025-42943)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-42943

Support options

Helpdesk Chat, Email, Knowledgebase