Advisory
On 09.12.2025 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within Kernel / Web Dispatcher.
SAP Note 3684682 addresses "[CVE-2025-42878] Sensitive Data Exposure in SAP Web Dispatcher and Internet Communication Manager (ICM)" to prevent information disclosure with a high risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process, the team suggests.
Information disclosure is when an application fails to properly protect sensitive and confidential information from
parties that are not supposed to have access to the subject matter in normal circumstances.
Carefully review every information disclosure vulnerablity in regards to disclosure obligations post-GDPR for
‘Personal data’ under the Data Protection Act 2018.
Risk specification
A vulnerability in SAP Web Dispatcher and ICM exposes internal testing endpoints and allows an attacker to call diagnostics and inject crafted HTTP requests against backend services, which can result in unauthorized operations and service disruption.
Solution
All icm/HTTP/icm_test_
The advisory is valid for
- KERNEL 7.22 33
- KERNEL 7.53 54
- KERNEL 7.54 33
- KERNEL 7.77 50
- KERNEL 7.89 33
- KERNEL 7.93 27
- KERNEL 9.16 5
- KRNL64NUC 7.22 39
- KRNL64NUC 7.22EXT 39
- KRNL64UC 7.22 39
- KRNL64UC 7.22EXT 39
- KRNL64UC 7.53 54
- WEBDISP 7.22_EXT 8
- WEBDISP 7.53 18
- WEBDISP 7.54 10
- WEBDISP 7.77 17
- WEBDISP 7.89 10
- WEBDISP 7.93 6
- WEBDISP 9.16
