- Description
- Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The system may be vulnerable when specially crafted input is used to exploit the vulnerability resulting in high impact on confidentiality, integrity and availability of the system.
- Source
- cna@sap.com
- NVD status
- Deferred
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 6
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- cna@sap.com
- CWE-502
- Hype score
- Not currently trending
SAP 2025年12月セキュリティパッチを公開-Solution Managerなど3件のクリティカルな脆弱性に注意(CVE-2025-42880,CVE-2025-55754 / CVE-2025-55752,CVE-2025-42928) https://t.co/NAvVnZLUcC #セキュリティ対策Lab #セキュリティ #Security
@securityLab_jp
11 Dec 2025
126 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-42928: CRITICAL] Warning: SAP jConnect vulnerability allows high privileged user to execute remote code through deserialization flaw. Confidentiality, integrity, and availability at risk. #CyberSec...#cve,CVE-2025-42928,#cybersecurity https://t.co/8d5vcX17RC https://t.c
@CveFindCom
9 Dec 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CRITICAL: SAP jConnect - SDK for ASE hit by CVE-2025-42928 (CVSS 9.1)! High-privileged users can trigger remote code execution. Patch ASAP to protect your enterprise systems. Details: https://t.co/PNUHKeHeJK... https://t.co/8IkJg3M9Dq
@offseq
9 Dec 2025
66 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes