Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap
Sap abap Platform Sap as Abap Sap netweaver Sap netweaver Abap Sap netweaver As Abap |
|
| Vendors & Products |
Sap
Sap abap Platform Sap as Abap Sap netweaver Sap netweaver Abap Sap netweaver As Abap |
Tue, 14 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Oct 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to the memory corruption vulnerability in SAP NetWeaver AS ABAP and ABAP Platform, an unauthenticated attacker can send a corrupted SAP Logon Ticket or SAP Assertion Ticket to the SAP application server. This leads to a dereference of NULL which makes the work process crash. As a result, it has a low impact on the availability but no impact on the confidentiality and integrity. | |
| Title | Memory Corruption vulnerability in SAP Netweaver AS ABAP and ABAP Platform | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2025-10-14T15:22:05.634Z
Reserved: 2025-04-16T13:25:25.736Z
Link: CVE-2025-42902
Updated: 2025-10-14T15:22:01.013Z
Status : Deferred
Published: 2025-10-14T01:15:31.960
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-42902
No data.
OpenCVE Enrichment
Updated: 2025-10-21T13:10:42Z