Categories: Cyber Security News

New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers

Key Takeaways
1. ShinyHunters publicly released exploits for critical SAP vulnerabilities.
2. Unauthenticated attackers can achieve complete system takeover and remote code execution.
3. Immediately apply SAP Security Notes 3594142 and 3604119.

A working exploit targeting critical SAP vulnerabilities CVE-2025-31324 and CVE-2025-42999 has been publicly released by the notorious cybercriminal group “Scattered LAPSUS$ Hunters – ShinyHunters” via Telegram channels, with VX Underground subsequently publishing the weaponized code on the social media platform X. 

The exploit chains two severe vulnerabilities in SAP NetWeaver Visual Composer, carrying maximum CVSS scores of 10.0, enabling unauthenticated attackers to achieve complete system compromise and remote code execution capabilities. 

Security researchers warn that the public release significantly escalates the threat landscape for organizations running unpatched SAP systems, particularly given the sophisticated nature of the exploit and its potential for widespread deployment.

SAP NetWeaver Exploitation

Onapsis reports that the exploit leverages a devastating combination of authentication bypass and deserialization flaws within SAP NetWeaver Visual Composer infrastructure. 

CVE-2025-31324 functions as the initial attack vector, allowing unauthenticated access to critical system functionality, while CVE-2025-42999 serves as the payload delivery mechanism through unsafe deserialization processes. 

This dual-vulnerability approach enables attackers to execute arbitrary operating system commands with SAP administrator (adm) privileges, effectively bypassing traditional security controls and gaining unrestricted access to sensitive business data and processes.

The technical implementation demonstrates a sophisticated understanding of SAP architecture, utilizing specific classes such as com.sap.sdo.api.* and com.sap.sdo.impl.* within the exploit framework. 

The malicious payload dynamically adapts based on SAP NetWeaver version detection, with the exploit code containing version-specific adjustments:

The publicly released exploit represents a significant escalation in threat actor capabilities, featuring a reusable deserialization gadget that extends beyond the original vulnerability scope. 

Security researchers express particular concern over the gadget’s potential application to recently patched deserialization vulnerabilities, including CVE-2025-30012, CVE-2025-42980, CVE-2025-42966, CVE-2025-42963, and CVE-2025-42964. 

This cross-vulnerability compatibility suggests threat actors possess comprehensive knowledge of SAP’s underlying architecture and serialization mechanisms.

CVE ID Title CVSS 3.1 Score Severity
CVE-2025-31324 SAP NetWeaver Visual Composer Authentication Bypass 10.0 Critical
CVE-2025-42999 SAP NetWeaver Visual Composer Deserialization Vulnerability 9.1 Critical

Mitigations

Organizations must immediately apply SAP Security Notes 3594142 and 3604119 to address the exploited vulnerabilities.

Additional critical patches include Security Notes 3578900, 3620498, 3610892, 3621771, and 3621236 for related deserialization flaws. 

Security teams should implement comprehensive monitoring for POST, GET, and HEAD requests targeting SAP Visual Composer components while restricting internet-facing SAP application access.

Safely detonate suspicious files to uncover threats, enrich your investigations, and cut incident response time. Start with an ANYRUN sandbox trial → 

The post New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Air Bud Returns Acknowledges Original Dog Buddy Is Canonically Dead

Air Bud is dead. Long live Air Bud! The first footage from Air Bud Returns…

49 minutes ago

The Popular Bluetti AC70 768Wh LiFePO4 Power Station Is $100 Cheaper at AliExpress Than Amazon

Bluetti is well known for its high quality yet affordable power stations and solar generators.…

49 minutes ago

IMPD Reckless Driving Arrests

INDIANAPOLIS, Ind. (WOWO) — The Indianapolis Metropolitan Police Department made multiple arrests and seized an…

52 minutes ago

Evansville City Council On Utility Costs

EVANSVILLE, Ind. (WOWO) — The Evansville City Council on Monday passed a resolution by a…

52 minutes ago

Immigration enforcement to be funded for 3 years under US Senate GOP plan

Senate Majority Leader John Thune, R-S.D., talks to reporters on March 3, 2026. From left…

53 minutes ago

Rockford trucking company advocates for stricter trucking regulations and safety

Meiborg Enterprises CEO Zach Meiborg is advocating for stricter federal trucking safety laws to prevent…

59 minutes ago

This website uses cookies.