Digital Pirates: How Russia, China, and Cyber-Gangs Can Hijack a Supertanker and Collapse Global Trade

-->
Skip to main contentYour expert source for cybersecurity threat intelligence. We provide in-depth analysis of CVEs, malware trends, and phishing scams, offering actionable AI-driven security insights and defensive strategies to keep you and your organization secure. CyberDudeBivash - Daily Cybersecurity Threat Intel, CVE Reports, Malware Trends & AI-Driven Security Insights. Stay Secure, Stay Informed.
By CyberDudeBivash • September 28, 2025, 10:17 AM IST • Enterprise Security Directive
This is a critical security directive for all SAP Basis, Security, and SOC teams. A sophisticated chained exploit is being actively used in the wild to achieve full Remote Code Execution (RCE) on SAP NetWeaver application servers. The attack leverages an unauthenticated Information Disclosure vulnerability in the SAP Message Server (**CVE-2025-31324**) to perform reconnaissance, followed by the exploitation of a critical authenticated RCE in the Internet Communication Manager (ICM) (**CVE-2025-42999**). An attacker with any low-privilege user account can leverage this chain to gain full control of your SAP system, with the privileges of the `
Disclosure: This is a technical security directive for enterprise IT professionals. It contains affiliate links to technologies and training essential for a defense-in-depth strategy for critical applications like SAP. Your support helps fund our independent research.
Securing your ERP requires a purpose-built, multi-layered defense.
This is a chained attack that relies on two separate flaws to succeed. Understanding each is key to effective defense and hunting.
A sophisticated attacker will chain these two flaws together for maximum effect.
This is your tactical checklist. Begin these actions now.
You must assume you were targeted before you patched. Your SOC and Basis teams need to hunt for these IoCs.
Patching is reactive. A secure SAP environment is built on a proactive, defense-in-depth strategy.
Q: What is the SAP Message Server and what does it do?
A: The Message Server is a small but critical process in an SAP ABAP system. It handles the communication between the multiple application server instances (dialog instances), managing user sessions and load balancing. It acts as the central messaging bus for the entire SAP SID.
Q: What is the SAP ICM?
A: The Internet Communication Manager (ICM) is a process included in every SAP NetWeaver application server. It is responsible for handling all web protocols (HTTP, HTTPS, SMTP). It allows users to access SAP via a web browser and enables SAP to act as both a web client and a web server. It is the primary attack surface for any web-based vulnerability in SAP.
Q: We run our SAP landscape in the cloud. Are we still responsible for these patches?
A: Yes, absolutely. If you are running SAP on IaaS (Infrastructure-as-a-Service) in any cloud, you are responsible for the security of the operating system and the SAP application itself. You must apply these SAP Security Notes. The cloud provider is only responsible for the security *of* the cloud; you are responsible for your security *in* the cloud.The best defense against this type of malware is a modern EDR solution. See our Ultimate Guide to Choosing the Best EDR to learn more.
Get deep-dive reports on critical enterprise application vulnerabilities, threat actor TTPs, and actionable hardening guides. Subscribe to stay ahead of the adversary.
Subscribe on LinkedIn#CyberDudeBivash #SAP #NetWeaver #CyberSecurity #ThreatIntel #RCE #InfoSec #AppSec #SAPBasis #CVE
Comments
Post a Comment