Rated Medium with a CVSS 3.1 score of 5.3, the flaw results from a NULL pointer dereference during ticket parsing, causing memory corruption and process termination.
SAP released its advisory and patches on October 14, 2025, urging administrators to apply updates immediately.
CVE-2025-42902 stems from insufficient validation of incoming SAP Logon Tickets and SAP Assertion Tickets.
When an application server receives a corrupted ticket, the parsing routine dereferences a NULL pointer, which leads to a crash of the ABAP work process.
Because the flaw requires no authentication or user interaction, it can be exploited remotely over the network, impacting availability through repeated ticket submissions that induce denial-of-service conditions. Confidentiality and integrity remain unaffected.
Affected versions span all supported releases from 7.22 through 9.16, covering various kernel builds for AS ABAP and ABAP Platform deployments.
SAP has confirmed that both standalone AS ABAP installations and broader ABAP Platform environments are impacted across multiple kernel and version builds.
| Field | Details |
|---|---|
| Product | SAP NetWeaver AS ABAP and ABAP Platform |
| Affected Versions | KRNL64NUC 7.22; 7.22EXT; KRNL64UC 7.22; 7.53; KERNEL 7.22; 7.54; 7.77; 7.89; 7.93; 9.14; 9.15; 9.16 |
| CVE ID | CVE-2025-42902 |
| CVSS 3.1 Score | 5.3 (Medium) |
The root cause of CVE-2025-42902 is a NULL Pointer Dereference (CWE-476) during ticket parsing.
The SAP application server anticipates a well-structured ticket object; however, malformed input leads to an unexpected NULL reference.
When the work process attempts to access memory at this NULL pointer, it triggers a crash.
In a typical attack scenario, an adversary crafts a malformed ticket payload and sends it via standard SAP logon interfaces. No valid SAP user credentials are required.
Each malformed ticket submission causes a work process to terminate; with sufficient parallel connections, the entire server instance may become unresponsive.
The following pseudocode illustrates the vulnerable sequence:
textreceive_ticket(payload):
ticket = parse_ticket(payload)
if ticket.header == NULL:
work_process.access(ticket.header) # NULL dereference
end if
continue_processing(ticket)
Unlike injection or authentication bypass vulnerabilities, this flaw relies purely on a memory safety error in ticket handling.
SAP published Security Note 3627308 and issued kernel and platform updates on its October 2025 patch day. Administrators should apply the provided patches without delay.
As a temporary workaround, organizations can disable external logon ticket acceptance on the SAP ICM component; however, this may disrupt legitimate federated logins.
In addition, network-level filtering of SAP interfaces and ensuring that SAProuter or Web Dispatcher is configured to permit only trusted sources can further reduce exposure.
Since no active exploitation of CVE-2025-42902 has been observed to date, proactive patching remains the optimal defense.
Regular security posture reviews and stringent network-level controls will help safeguard SAP environments against similar memory corruption vulnerabilities.
Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today
The post Memory Corruption Vulnerability in SAP NetWeaver Allows Injection of Corrupted SAP Logon Tickets appeared first on Cyber Security News.
Harman's most popular portable speaker just saw a huge price drop. The highly-rated Harman Kardon…
UK politicians have strongly criticized GTA 6 developer Rockstar for its firing of 34 workers…
May is quite a big month for LEGO fans. Not only are there a wide…
Christopher Nolan has defended his upcoming movie, The Odyssey, from complaints about historical accuracy, after…
If you’re looking for recently released games to play on Switch, both Metroid Prime 4:…
Marvel fans are still puzzling over the decision to wrap up the wildly successful Ultimate…
This website uses cookies.