Advisory
A note with CVSS 5.3 for component BC-SEC-LGN was released by SAP on 14.10.2025. The correction/advisory 3627308 was described with "[CVE-2025-42902] Memory Corruption vulnerability in SAP Netweaver AS ABAP and ABAP Platform" and affects the system type Kernel.
A workaround exists, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process.
The vulnerability addressed is memory corruption within Kernel.
Risk specification
SAP NetWeaver AS ABAP and ABAP Platform allow an unauthenticated attacker to send a corrupted SAP Logon Ticket or SAP Assertion Ticket to the SAP application server, which can lead to a work process crash.Solution
The correction prevents a null pointer dereference during the verification process of SAP tickets. Although an alternative solution exists, it is advisable to apply the correction! This is the workaround, which was suggested by the SAP security experts: "Preventing the vulnerability by disabling SAP Logon Tickets and SAP Assertion Tickets by setting the profile parameter login/accept_sso2_ticket=0. The deactivation of the ticket acceptance functionality impacts integration scenarios using these tickets.".
The advisory is valid for
- KERNEL 7.22 32
- KERNEL 7.53 51
- KERNEL 7.54 30
- KERNEL 7.77 48
- KERNEL 7.89 31
- KERNEL 7.93 25
- KERNEL 9.14 8
- KERNEL 9.15 3
- KERNEL 9.16 3
- KRNL64NUC 7.22 38
- KRNL64NUC 7.22EXT 38
- KRNL64UC 7.22 38
- KRNL64UC 7.22EXT 38
- KRNL64UC 7.53 51
