Advisory
On 09.09.2025 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within Kernel.
SAP Note 3627373 addresses "[CVE-2025-42958] Missing Authentication check in SAP NetWeaver" to prevent missing authentication check with a hot news risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process, the team suggests.
Risk specification
SAP NetWeaver Application Server Kernels on IBM i-series lack an authentication check, allowing authenticated attackers to access privileged functions and manipulate sensitive data, leading to full system compromise.Solution
Security is improved by enforcing stricter access controls on affected functions and reducing privileges in SAP user profiles.
The advisory is valid for
- KERNEL 7.22 31
- KERNEL 7.53 48
- KERNEL 7.54 27
- KRNL64NUC 7.22 37
- KRNL64NUC 7.22EXT 37
- KRNL64UC 7.22 37
- KRNL64UC 7.22EXT 37
- KRNL64UC 7.53 48
- 10.0 [CVE-2020-26829] Missing Authentication Check in SAP NetWeaver AS JAVA (P2P Cluster Communication)
- 10.0 [CVE-2020-6207] Missing Authentication Check in SAP Solution Manager (User-Experience Monitoring)
- 9.9 [CVE-2025-42922] Insecure File Operations vulnerability in SAP NetWeaver AS Java (Deploy Web Service)
- 9.9 [CVE-2023-23857] Improper Access Control in SAP NetWeaver AS for Java
- 9.8 [CVE-2025-30016] Authentication Bypass Vulnerability in SAP Financial Consolidation