SAP’s September Surprise: Major NetWeaver Flaws Get the Boot!

SAP’s September 2025 Patch Day revealed 21 new security notes, including critical NetWeaver flaws. Among them, a deserialization issue and a file operation flaw could lead to system compromise. Onapsis Research Labs helped patch two critical flaws, ensuring SAP users can rest easier—unless, of course, they’re napping on the job.

Pro Dashboard

Hot Take:

**_SAP’s September Patch Day feels like a cybersecurity soap opera with more drama than a daytime TV show! Four critical flaws got their moment in the spotlight, and it seems like SAP’s NetWeaver is the star of the show, albeit reluctantly. Get your popcorn ready, because this month’s episode is all about remote code execution, privilege escalation, and a dash of directory traversal for good measure!_**

Key Points:

– SAP issued 21 new and 4 updated security notes, four of which are critical.
– Two critical vulnerabilities were patched in NetWeaver AS Java with the help of Onapsis Research Labs.
– The most severe flaw, CVE-2025-42944, allows remote code execution via malicious payloads.
– A Directory Traversal flaw from 2023 received an update, highlighting the ongoing saga of cybersecurity.
– Unclear if any vulnerabilities have been exploited in the wild.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?