Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3677544
was released on
09.12.2025 and deals with
"[CVE-2025-42877] Memory Corruption vulnerability in SAP Web Dispatcher, Internet Communication Manager and SAP Content Server" within Kernel / Web Dispatcher.
We advice you to follow the instructions, to resolve
denial of service (dos)
with a
high potential for exploitation
in component BC-CST-IC.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as monthly patch process.
Denial of Service (DoS) attacks that take a system offline may lead to significant cost for the company, studies quantify the costs in average between 4 and 5 millions dollars. Business continuity requires SAP systems staying online. The CVSS scores or vulnerability descriptions are not enough to represent how a simple bug can lead to a significant loss for companies.
Risk specification
A vulnerability in SAP Web Dispatcher, ICM, and SAP Content Server allows an attacker to send crafted network requests that corrupt memory, which can result in process crashes and repeated service interruptions.
Solution
The application corrects memory handling and enforces strict bounds checking and input validation across Web Dispatcher, ICM, and Content Server, ensuring that malformed requests are rejected and execution remains stable.
The advisory is valid for
- CONTSERV 7.53 5
- CONTSERV 7.54 3
- KERNEL 7.53 54
- KERNEL 7.54 33
- KRNL64UC 7.53 54
- SAP_EXTENDED_APP_SERVICES 1 11
- WEBDISP 7.53 18
- WEBDISP 7.54 10
- XS_ADVANCED_RUNTIME 1.00 11
