CVE-2025-42995

| EUVD-2025-17594 HIGH
2025-06-10 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17594
CVE Published
Jun 10, 2025 - 01:15 nvd
HIGH 7.5

Description

SAP MDM Server Read function allows an attacker to send specially crafted packets which could trigger a memory read access violation in the server process that would then fail and exit unexpectedly causing high impact on availability with no impact on confidentiality and integrity of the application.

Analysis

Denial-of-service vulnerability in SAP MDM Server's Read function that allows unauthenticated network attackers to trigger memory read access violations by sending specially crafted packets, causing the server process to crash and become unavailable. The vulnerability affects SAP MDM Server with a CVSS score of 7.5 (high severity) but is limited to availability impact with no confidentiality or integrity compromise. Status of active exploitation (KEV) and proof-of-concept availability are not specified in available intelligence.

Technical Context

The vulnerability exists in SAP MDM Server's Read function implementation and is classified under CWE-590 (Improper Null Dereference or Insufficient Null Checking), indicating the root cause involves improper memory access handling or null pointer dereference logic. The flaw allows attackers to craft malicious network packets that trigger unhandled memory read exceptions in the server process. SAP MDM (Master Data Management) is an enterprise data governance platform that typically runs on Windows or Linux infrastructure and handles critical business data through network-accessible services. The Read function processes incoming network requests, and insufficient input validation or bounds checking allows crafted packets to reference invalid memory addresses, causing an access violation that terminates the process rather than being gracefully handled.

Affected Products

SAP MDM Server (specific version range not explicitly stated in description; likely recent versions based on CVE-2025 designation). Affected configurations include any deployment of SAP MDM Server with network-accessible Read function endpoints. CPE data not provided in intelligence summary, but typical affected product identifier would be: cpe:2.3:a:sap:master_data_management_server:*:*:*:*:*:*:*:*. Organizations should consult SAP Security Advisory database and SAP Note system for exact affected versions and patch availability. The vulnerability likely affects multiple SAP MDM releases and may impact both on-premises and cloud-hosted SAP MDM implementations.

Remediation

Immediate remediation steps: (1) Contact SAP support or monitor SAP Security Advisories for available patches and their version numbers; (2) If patches are unavailable, implement network-level controls restricting access to SAP MDM Server ports (typically TCP 50000-50050 for default installations) to trusted internal networks only; (3) Deploy intrusion detection signatures to identify specially crafted packets targeting the Read function; (4) Monitor SAP MDM Server process logs for repeated crashes or access violation errors; (5) Implement high-availability clustering or failover mechanisms to automatically restart crashed MDM instances to reduce downtime impact. Temporary workarounds pending patches include: disabling external network access to MDM ports, requiring VPN connectivity, implementing packet inspection firewalls, or reducing server exposure through network segmentation. Once SAP publishes patches, apply them to all affected MDM instances in a controlled maintenance window, testing thoroughly in non-production environments first given the critical nature of MDM systems.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +38
POC: 0

Share

CVE-2025-42995 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy