SAP patch day: manufacturer plugs security gaps, some of them critical

In January, SAP issued 14 security notifications and associated updates for its products. Two of these are considered critical.

listen Print view
Stylized image: Laptop with SAP logo on fire, in front of server racks

There are security gaps in SAP products.

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

3 min. read

SAP is celebrating the first patch day of the still young year 2025 and is addressing 14 security vulnerabilities in several products. Two of these have been given the highest risk rating of"critical". IT managers should therefore install the available updates as quickly as possible.

The manufacturer lists the individual security notifications in SAP's patchday overview. Logged-in users can gain unauthorized access to the system in SAP NetWeaver Application Server for ABAP and ABAP Platform, as insufficient authentication checks allow an extension of rights (CVE-2025-0070, CVSS 9.9, risk"critical"). In addition, attackers can gain unauthorized access to sensitive information in SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Framework) under undisclosed, specific conditions, which is due to "weak access controls" (CVE-2025-0066, CVSS 9.9, critical).

The developers also classify three other vulnerabilities as high risk. They can be found in SAP NetWeaver AS for ABAP and ABAP Platform, SAP BusinessObjects Business Intelligence Platform and SAPSetup. Admins should also quickly apply the available updates for these vulnerabilities.

Videos by heise

An overview of the individual security vulnerabilities in SAP products that will be addressed on January Patchday:

In December last year, SAP addressed nine newly discovered security vulnerabilities. The company's developers also updated four older security reports with new information.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.