First published: Tue Jan 14 2025(Updated: )
Due to a missing authorization check on service endpoints in the SAP NetWeaver Application Server Java, an attacker with standard user role can create JCo connection entries, which are used for remote function calls from or to the application server. This could lead to low impact on confidentiality, integrity, and availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver AS for Java |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0067 has a low impact severity level due to the nature of the vulnerability allowing unauthorized creation of JCo connection entries.
To fix CVE-2025-0067, implement proper authorization checks on the service endpoints within the SAP NetWeaver Application Server Java.
CVE-2025-0067 affects all versions of SAP NetWeaver Application Server Java that lack the necessary authorization checks.
An attacker exploiting CVE-2025-0067 could create unauthorized JCo connection entries, allowing them to make remote function calls.
Yes, SAP provides updates and patches to address CVE-2025-0067; users should refer to SAP's security notes for specific instructions.