
SAP Security Alert: Urgent Patches Released for Critical Vulnerabilities
SAP has released its latest security updates, addressing a range of vulnerabilities across its product landscape. This month’s Patch Day is particularly significant, as it includes fixes for four critical vulnerabilities that could expose businesses to severe risks, including system compromise and data breaches. All organizations running SAP software are strongly urged to review these updates and apply them immediately to safeguard their critical systems.
The security of enterprise resource planning (ERP) systems is paramount, as they often house an organization’s most sensitive financial, customer, and operational data. A failure to patch known vulnerabilities can provide attackers with a direct path to mission-critical assets.
A Closer Look at the Critical Threats
This month’s patches address a total of 13 new Security Notes, with four earning a “HotNews” designation—SAP’s highest priority level, reserved for flaws that pose a significant and immediate threat. These critical vulnerabilities require your urgent attention.
While the specifics vary, these high-severity issues often fall into dangerous categories that can cripple business operations if exploited. The most severe vulnerabilities addressed this month include:
Potential for Remote Code Execution (RCE): One of the most dangerous types of vulnerabilities, an RCE flaw allows an unauthenticated attacker to execute arbitrary code on a targeted system over the network. This can lead to a complete system takeover, giving the attacker full control to steal data, disrupt services, or use the compromised server to launch further attacks within your network.
Improper Access Control in Core Components: This vulnerability could allow a low-privileged user to gain unauthorized access to sensitive administrative functions or data. Such privilege escalation flaws are a primary tool for attackers, enabling them to move from a minor foothold to full administrative control, often without being detected.
SQL Injection Vulnerabilities: A critical SQL Injection flaw was discovered in a key SAP application, which could allow an attacker to interfere with the application’s database queries. A successful exploit can result in unauthorized access to view, modify, or delete sensitive data, compromising the integrity and confidentiality of your business information.
Information Disclosure in a Widely Used Module: This vulnerability could allow an attacker to access sensitive technical or business information that should not be publicly available. Even without direct system control, this data can be used to plan more sophisticated attacks or could lead to a major data leak, resulting in regulatory fines and reputational damage.
Your Immediate Action Plan: Securing Your SAP Landscape
Leaving these critical vulnerabilities unpatched is not an option. Threat actors actively scan for unpatched systems, and automated exploits can be developed quickly after a patch is released. We recommend a proactive and systematic approach to applying these security updates.
Here are the essential steps your IT and security teams should take now:
Prioritize and Patch Immediately: The four “HotNews” vulnerabilities should be at the top of your patching list. Due to their severity, these should not wait for your next scheduled maintenance window. The risk of exploitation far outweighs the potential disruption of an emergency patch.
Review All New Security Notes: While the critical flaws demand immediate attention, it’s crucial to review all 13 of the new and updated Security Notes released this month. High-priority vulnerabilities could also pose a significant risk depending on your specific system configuration and usage.
Test Patches in a Sandbox Environment: Before deploying any patch to your production environment, always test it in a controlled, non-production system. This helps ensure that the update will not cause unforeseen operational issues or conflicts with other system components.
Conduct a Vulnerability Scan: After applying the patches, run a vulnerability scan across your SAP landscape. This will help verify that the patches were applied correctly and that no systems were missed, confirming that the vulnerabilities have been successfully remediated.
In today’s threat environment, maintaining a robust security posture is a continuous effort. This month’s SAP Patch Day serves as a critical reminder that proactive patch management is one of the most effective defenses against cyberattacks. Don’t delay—protect your organization by taking swift and decisive action.
Source: https://securityaffairs.com/182040/security/sap-september-2025-patch-day-fixed-4-critical-flaws.html


