First published: Tue Jan 14 2025(Updated: )
Due to DLL injection vulnerability in SAPSetup, an attacker with either local user privileges or with access to a compromised corporate user�s Windows account could gain higher privileges. With this, he could move laterally within the network and further compromise the active directory of a company. This leads to high impact on confidentiality, integrity and availability of the Windows server.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP ERP (SAP S/4HANA) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0069 is considered a high-severity vulnerability due to its potential for privilege escalation.
To remediate CVE-2025-0069, apply the latest security patch provided by SAP for SAPSetup.
CVE-2025-0069 affects systems running SAPSetup that are accessible to local users or compromised accounts.
CVE-2025-0069 requires local user access or a compromised corporate account, making it an indirect threat for remote exploitation.
Exploitation of CVE-2025-0069 could allow an attacker to gain higher privileges and facilitate lateral movement within the network.