Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The system may be vulnerable when specially crafted input is used to exploit the vulnerability resulting in high impact on confidentiality, integrity and availability of the system.
Metrics
Affected Vendors & Products
References
History
Tue, 09 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap
Sap jconnect |
|
| Vendors & Products |
Sap
Sap jconnect |
Tue, 09 Dec 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The system may be vulnerable when specially crafted input is used to exploit the vulnerability resulting in high impact on confidentiality, integrity and availability of the system. | |
| Title | Deserialization Vulnerability in SAP jConnect - SDK for ASE | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published: 2025-12-09T02:15:45.247Z
Updated: 2025-12-10T04:57:09.434Z
Reserved: 2025-04-16T13:25:32.384Z
Link: CVE-2025-42928
Updated: 2025-12-09T15:25:13.257Z
Status : Awaiting Analysis
Published: 2025-12-09T16:17:53.170
Modified: 2025-12-09T18:36:53.557
Link: CVE-2025-42928
No data.