Particle.news

Download on the App Store

Public Exploit Chains SAP NetWeaver Flaws, Leaving Unpatched Systems Exposed to RCE

CISA’s KEV listing signals elevated risk from reusable deserialization code highlighted by researchers.

Image
Image

Overview

  • Onapsis verified that the publicly released tool chains CVE-2025-31324 with CVE-2025-42999 to bypass authentication and execute system commands with SAP administrator privileges.
  • Vx-Underground reported the release by “Scattered Lapsus$ Hunters,” a fluid alliance tying Scattered Spider to ShinyHunters, after the code surfaced on Telegram.
  • Researchers said the published deserialization gadget could be repurposed against additional SAP bugs patched in July, widening possible attack vectors.
  • Shadowserver observed more than 50 internet-facing NetWeaver servers still vulnerable to CVE-2025-31324 as of August 18, underscoring ongoing exposure.
  • SAP addressed the two flaws in April and May, and defenders are urged to apply Security Notes 3594142 and 3604119, restrict the /developmentserver/metadatauploader endpoint, and hunt for web shells or living-off-the-land activity.