Description
Due to a deserialization vulnerability in SAP NetWeaver, an unauthenticated attacker could exploit the system through the RMI-P4 module by submitting malicious payload to an open port. The deserialization of such untrusted Java objects could lead to arbitrary OS command execution, posing a high impact to the application's confidentiality, integrity, and availability.
Exploits (1)
References (4)
Core 4
Core References
Vendor Advisory
https://me.sap.com/notes/3634501
Vendor Advisory
https://me.sap.com/notes/3660659
Vendor Advisory
https://me.sap.com/notes/3670067
Vendor Advisory
https://url.sap/sapsecuritypatchday
Scores
CVSS v3
10.0
EPSS
0.0014
EPSS Percentile
33.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-502
Status
published
Products (1)
SAP_SE/SAP Netweaver (RMI-P4)
SERVERCORE 7.50
Published
Sep 09, 2025
Tracked Since
Feb 18, 2026