Advisory
On 09.04.2024 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP Edge Integration.
SAP Note 3442741 addresses "Stack overflow vulnerability on the component images of SAP Integration Suite (EDGE INTEGRATION CELL)" to prevent remote code execution vulnerability with a medium risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process, the team suggests.
Risk specification
In the open source component busybox, a vulnerability exists that can be manipulated to cause a stack overflow, enabling an attacker to run arbitrary code from the command line within a container image, leading to system compromise.Solution
The application has now updated the alpine base image version to 3.18.4 or higher, which includes BusyBox version 1.35, effectively mitigating the risk of the stack overflow vulnerability.
The advisory is valid for
- CTNR_IS_EDGE_DEPLOY_CONTROLLER 1.0
- 9.1 [CVE-2025-42963] Insecure Deserialization in SAP NetWeaver Application Server for Java (Log Viewer )
- 9.1 [CVE-2025-42964] Insecure Deserialization in SAP NetWeaver Enterprise Portal Administration
- 9.1 [CVE-2025-42980] Insecure Deserialization in SAP NetWeaver Enterprise Portal Federated Portal Network
- 9.1 [CVE-2025-42999] Insecure Deserialization in SAP NetWeaver (Visual Composer development server)
- 4.7 [CVE-2024-39599] Protection Mechanism Failure in SAP NetWeaver Application Server for ABAP and ABAP Platform