CVE Alert: CVE-2025-42929 – SAP_SE – SAP Landscape Transformation Replication Server
CVE-2025-42929
Due to missing input validation, an attacker with high privilege access to ABAP reports could delete the content of arbitrary database tables, if the tables are not protected by an authorization group. This leads to a high impact on integrity and availability of the database.
AI Summary Analysis
Risk verdict
High-risk vulnerability with potential rapid impact on data integrity and system availability; exploitation would require high-privilege ABAP report access from an adjacent network, and no explicit exploitation status is provided.
Why this matters
Missing input validation allows a high-privilege attacker to delete contents of arbitrary database tables not protected by authorization groups, risking data loss and service disruption. In environments with replication or critical data stores, abuse of ABAP report interfaces could spread impact beyond a single component.
Most likely attack path
- Preconditions: access to ABAP reporting interfaces and high-privilege credentials within the same network segment.
- Exploit: abuse of unauthorised input handling to perform destructive DML on unprotected tables.
- Outcome: compromised data integrity and potential outages; scope may extend if broader tables are improperly protected.
Who is most exposed
Organizations with mature ABAP report ecosystems and data replication setups, where administrators or developers can execute high-privilege reports and where per-table authorization may be lax.
Detection ideas
- Look for high-privilege ABAP report executions that delete or truncate large numbers of tables.
- Monitor for DML operations on critical tables by accounts lacking explicit per-table authorisation.
- Alert on unusual ABAP report activity outside normal maintenance windows.
- Correlate ABAP report runs with sudden drops in table sizes or data integrity issues.
- Audit changes to authorization groups and table-level permissions.
Mitigation and prioritisation
- Apply vendor security notes/patches addressing input validation and privilege checks; upgrade to recommended non-affected versions where available.
- Enforce strict per-table permissions and authorization groups for all critical tables; review ABAP report access controls.
- Implement least-privilege governance for ABAP report users and disable unnecessary high-privilege accounts.
- Enable enhanced logging and database auditing; set up real-time monitoring for destructive DML via ABAP.
- Change-management: treat as a priority 2 unless indicators of exploitation or KEV/EPSS data suggest higher urgency.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.