Home

Description

Due to a deserialization vulnerability in SAP NetWeaver, an unauthenticated attacker could exploit the system through the RMI-P4 module by submitting malicious payload to an open port. The deserialization of such untrusted Java objects could lead to arbitrary OS command execution, posing a high impact to the application's confidentiality, integrity, and availability.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-09 | Updated 2025-10-14 | Assigner sap




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

Default status
unaffected

SERVERCORE 7.50
affected

References

me.sap.com/notes/3660659

me.sap.com/notes/3634501

url.sap/sapsecuritypatchday

cve.org (CVE-2025-42944)

nvd.nist.gov (CVE-2025-42944)

Download JSON