CVE-2025-42928
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: SAP SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sap | jconnect | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deserialization flaw in SAP jConnect that can be exploited by a high privileged user under certain conditions. By using specially crafted input, the attacker can execute remote code on the affected system.
How can this vulnerability impact me? :
Exploiting this vulnerability can lead to remote code execution, which may severely impact the confidentiality, integrity, and availability of the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability, due to its high impact on confidentiality, integrity, and availability through remote code execution, could potentially lead to non-compliance with standards such as GDPR and HIPAA, which require protection of sensitive data and system integrity. Exploitation might result in unauthorized data access or system disruption, thereby violating these regulations. However, specific compliance impacts are not detailed in the provided resources.