CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Description
SAP MDM Server ReadString function allows an attacker to send specially crafted packets which could trigger a memory read access violation in the server process that would then fail and exit unexpectedly causing high impact on availability with no impact on confidentiality and integrity of the application.
Analysis
Denial-of-service vulnerability in SAP MDM Server's ReadString function that allows unauthenticated remote attackers to trigger memory read access violations causing unexpected server process termination. The vulnerability affects SAP Master Data Management (MDM) Server and has a CVSS score of 7.5 with high availability impact; no confidentiality or integrity compromise occurs. This is a network-accessible denial-of-service vector with low attack complexity and no authentication requirements, making it a significant availability risk for organizations deploying SAP MDM infrastructure.
Technical Context
The vulnerability exists in SAP MDM Server's ReadString function, which handles parsing of string data from network packets. The root cause is classified as CWE-590 (Improper Null Termination), indicating insufficient validation or bounds checking when processing string input from untrusted network sources. The ReadString function likely fails to properly validate input length, encoding, or null-termination before performing memory operations, resulting in out-of-bounds read access. This memory safety issue in network protocol handling allows specially crafted packets to trigger access violations within the server process address space. The vulnerability affects SAP MDM Server components responsible for data communication and protocol parsing, which operate with system-level privileges and handle untrusted remote input without adequate sanitization.
Affected Products
SAP MDM Server (Master Data Management Server) - specific version ranges not provided in submitted data. Based on vulnerability class and SAP product architecture, likely affects MDM Server 7.x and earlier versions. CPE identifier would be of form 'cpe:2.3:a:sap:master_data_management_server:*:*:*:*:*:*:*:*'. Organizations should consult SAP Security Patch Day advisories and SAP Note system for exact affected versions. Typical affected configurations include SAP MDM Server installations handling data import/export operations, replication services, or exposed to untrusted network sources.
Remediation
1) Obtain and apply the latest SAP security patch for MDM Server from SAP's support portal or Security Patch Day release. 2) Consult SAP Note (KB article) corresponding to CVE-2025-42994 for version-specific patch details and implementation guidance. 3) Implement network segmentation to restrict MDM Server access to trusted internal networks only, preventing direct exposure to untrusted remote sources. 4) Deploy intrusion detection/prevention systems to detect and block packets matching the vulnerability trigger pattern (specially crafted ReadString inputs). 5) Monitor SAP MDM Server processes for unexpected terminations and implement process restart automation as a temporary mitigation. 6) Upgrade to the minimum patched version once SAP releases official fixes (typically published on Security Patch Day or critical patch schedule).
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17595