Home

Description

SAP GUI for Windows may allow the leak of NTML hashes when specific ABAP frontend services are called with UNC paths. For a successful attack, the attacker needs developer authorization in a specific Application Server ABAP to make changes in the code, and the victim needs to execute by using SAP GUI for Windows. This could trigger automatic NTLM authentication, potentially exposing hashed credentials to an attacker. As a result, it has a high impact on the confidentiality.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-12 | Updated 2025-08-12 | Assigner sap




MEDIUM: 4.5CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-250: Execution with Unnecessary Privileges

Product status

Default status
unaffected

BC-FES-GUI 8.00
affected

References

me.sap.com/notes/3627845

url.sap/sapsecuritypatchday

cve.org (CVE-2025-42943)

nvd.nist.gov (CVE-2025-42943)

Download JSON