Due to a missing authorization check vulnerability in SAP S/4HANA (Enterprise Event Enablement), an attacker with access to the Inbound Binding Configuration could create an RFC destination and assign an arbitrary high-privilege user. This allows the attacker to consume events via the RFC destination, leading to code execution under the privileges of the assigned high-privilege user. While the vulnerability has a low impact on Availability, it significantly poses a high risk to both Confidentiality and Integrity.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Jun 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to a missing authorization check vulnerability in SAP S/4HANA (Enterprise Event Enablement), an attacker with access to the Inbound Binding Configuration could create an RFC destination and assign an arbitrary high-privilege user. This allows the attacker to consume events via the RFC destination, leading to code execution under the privileges of the assigned high-privilege user. While the vulnerability has a low impact on Availability, it significantly poses a high risk to both Confidentiality and Integrity. | |
Title | Missing Authorization Check in SAP S/4HANA (Enterprise Event Enablement) | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: sap
Published: 2025-06-10T00:13:15.633Z
Updated: 2025-06-11T04:01:28.293Z
Reserved: 2025-04-16T13:25:50.941Z
Link: CVE-2025-42993

Updated: 2025-06-10T13:36:42.467Z

Status : Awaiting Analysis
Published: 2025-06-10T01:15:22.667
Modified: 2025-06-12T16:06:39.330
Link: CVE-2025-42993

No data.