We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-42976

Multiple vulnerabilities in SAP NetWeaver Application Server ABAP (BIC Document)



Description

SAP NetWeaver Application Server ABAP (BIC Document) allows an authenticated attacker to craft a request that, when submitted to a BIC Document application, could cause a memory corruption error. On successful exploitation, this results in the crash of the target component. Multiple submissions can make the target completely unavailable. A similarly crafted submission can be used to perform an out-of-bounds read operation as well, revealing sensitive information that is loaded in memory at that time. There is no ability to modify any information.

Reserved 2025-04-16 | Published 2025-08-12 | Updated 2025-08-12 | Assigner sap


HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Problem types

CWE-125: Out-of-bounds Read

Product status

Default status
unaffected

S4COREOP 104
affected

105
affected

106
affected

107
affected

108
affected

SEM-BW 600
affected

602
affected

603
affected

604
affected

605
affected

634
affected

736
affected

746
affected

747
affected

748
affected

References

me.sap.com/notes/3611184

url.sap/sapsecuritypatchday

cve.org (CVE-2025-42976)

nvd.nist.gov (CVE-2025-42976)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-42976

Support options

Helpdesk Chat, Email, Knowledgebase