Advisory
A note with CVSS 10.0 for component BC-JAS-COR was released by SAP on 14.10.2025. The correction/advisory 3660659 was described with "[CVE-2025-42944] Security Hardening for Insecure Deserialization in SAP NetWeaver AS Java" and affects the system type Java.
A workaround exists, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process.
The vulnerability addressed is insecure deserialization within Java.
Risk specification
This note has been re-released with an updated description. SAP NetWeaver AS Java may be vulnerable to remote code execution due to insecure deserialization of JDK and third-party classes. No new CVE ID is assigned for this advisory, as it serves as a security hardening measure. The CVSS score is explicitly based on the security note issued for RMI/P4 (3634501).Solution
Deserialization of JDK and third-party classes is now restricted in SAP NetWeaver AS Java. Although an alternative solution exists, it is advisable to apply the correction! This is the workaround, which was suggested by the SAP security experts: "Follow the steps in the Note to add jdk.serialFilter parameter at the JVM level to restrict which classes can be deserialized.".
Affected System
SAP Netweaver Application Server Java is part of the SAP NetWeaver Application Platform. It provides the complete infrastructure for deploying and running Java applications.
- The AS Java Home: SAP Netweaver Application Server Java wiki
- A dedicated SAP NetWeaver 7.40 Application Server for Java Security Guide exists.
The advisory is valid for
- 10.0 [CVE-2025-42944] Insecure Deserialization vulnerability in SAP Netweaver (RMI-P4)
- 9.1 [CVE-2025-42966] Insecure Deserialization vulnerability in SAP NetWeaver (XML Data Archiving Service)
- 3.5 [CVE-2025-31672] Deserialization Vulnerability in SAP BusinessObjects (Web Intelligence and Platform Search)
