First published: Tue Apr 08 2025(Updated: )
Due to directory traversal vulnerability, an authorized attacker could gain access to some critical information by using RFC enabled function module. Upon successful exploitation, they could read files from any managed system connected to SAP Solution Manager, leading to high impact on confidentiality. There is no impact on integrity or availability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver | ||
SAP ABAP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27428 has a high severity rating due to its potential to allow unauthorized access to critical information.
To fix CVE-2025-27428, apply the latest security patches provided by SAP for the affected versions of SAP NetWeaver and SAP ABAP Platform.
CVE-2025-27428 affects users of SAP NetWeaver and SAP ABAP Platform that utilize the RFC enabled function module.
Exploiting CVE-2025-27428 can allow unauthorized attackers to read sensitive files from any managed system connected to SAP Solution Manager.
A directory traversal vulnerability, as seen in CVE-2025-27428, allows attackers to access system files and directories that are outside the intended file paths.