Sunday, June 29, 2025
Google search engine
HomeTechnologyCyber SecurityOver 1,200 SAP NetWeaver servers susceptible to actively exploited flaw

Over 1,200 SAP NetWeaver servers susceptible to actively exploited flaw


Over 1,200 internet-exposed SAP NetWeaver situations are susceptible to an actively exploited most severity unauthenticated file add vulnerability that permits attackers to hijack servers.

SAP NetWeaver is an utility server and growth platform that runs and connects SAP and non-SAP functions throughout completely different applied sciences.

Final week, SAP disclosed an unauthenticated file add vulnerability, tracked as CVE-2025-31324, in SAP NetWeaver Visible Composer, particularly the Metadata Uploader part.

The flaw permits distant attackers to add arbitrary executable recordsdata on uncovered situations with out authenticating, attaining code execution and full system compromise.

A number of cybersecurity companies, together with ReliaQuest, watchTowr, and Onapsis, confirmed the flaw is actively exploited in assaults, with risk actors using it to drop net shells on susceptible servers.

A SAP spokesperson advised BleepingComputer that they have been conscious of those makes an attempt and launched a workaround on April 8, 2024, adopted by a safety replace that addressed CVE-2025-31324 on April 25.

SAP advised BleepingComputer that they don’t seem to be conscious of any instances the place these assaults impacted buyer information or methods.

Extensively exploited in assaults

Researchers have now confirmed that many susceptible SAP Netweaver servers are uncovered on the web, making them prime targets for assaults.

The Shadowserver Basis discovered the 427 uncovered servers, warning of the large uncovered assault floor and the possibly extreme repercussions of exploitation.

Many of the susceptible methods (149) are in the US, adopted by India (50), Australia (37), China (31), Germany (30), the Netherlands (13), Brazil (10), and France (10).

Location of vulnerable SAP NetWeaver instancesLocation of susceptible SAP NetWeaver situations
Supply: The Shadowserver Basis

Nevertheless, cyber protection search engine Onyphe paints a extra dire image, telling BleepingComputer that there are 1,284 susceptible servers uncovered on-line, with 474 already having been compromised with webshells.

“One thing like 20 Fortune 500/World 500 corporations are susceptible, and a lot of them are compromised,” Onyphe CTO Patrice Auffret advised BleepingComputer.

Researchers reported that the risk actors are using webshells with names like, “cache.jsp” and “helper.jsp.” Howver, Nextron Analysis says they’re additionally utilizing random names, making it tougher to search out susceptible Netweaver situations.

Whereas the variety of servers shouldn’t be large, the danger continues to be important, given that enormous enterprises and multinational firms generally use SAP NetWeaver.

To deal with the danger, it is strongly recommended that the newest safety replace be utilized by following the seller’s directions in this bulletin.

If unable to use the replace, the beneath mitigations are beneficial:

Prohibit entry to the /developmentserver/metadatauploader endpoint.
If Visible Composer shouldn’t be in use, contemplate turning it off fully.
Ahead logs to SIEM and scan for unauthorized recordsdata within the servlet path.

RedRays has additionally launched a scanner device for CVE-2025-31324 that may assist pinpoint dangers in giant environments.

BleepingComputer contacted SAP with additional questions in regards to the energetic exploitation and can replace the story with any response.



Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments