Skip links
Picture of Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Potential remote termination of running work processes, SAP security note 1741793

Description

An attacker can remotely exploit a single work process of an SAP application server ABAP so that they can terminate it manually.

In the last resort we cannot rule out a remote code execution which in the worst case leads to complete control of the server.

CVSS Information

CVSS Base Score: 10.0
CVSS Base Vector: AV:N/AC:L/AU:N/C:C/I:C/A:C

SAP provides this CVSS base score as an estimate of the risk posed by the issue reported in this note. This estimate does not take into account your own system configuration or operational environment. It is not intended to replace any risk assessments you are advised to conduct when deciding on the applicability or priority of this SAP security note. For more information, see the FAQ section at https://service.sap.com/securitynotes/.

Available fix and Supported packages

  • KRNL32NUC | 7.20 | 7.20
  • KRNL32NUC | 7.20EXT | 7.20EXT
  • KRNL32NUC | 7.21 | 7.21
  • KRNL32NUC | 7.21EXT | 7.21EXT
  • KRNL32UC | 7.20 | 7.20
  • KRNL32UC | 7.20EXT | 7.20EXT
  • KRNL32UC | 7.21 | 7.21
  • KRNL32UC | 7.21EXT | 7.21EXT
  • KRNL64NUC | 7.20 | 7.20
  • KRNL64NUC | 7.20EXT | 7.20EXT
  • KRNL64NUC | 7.21 | 7.21
  • KRNL64NUC | 7.21EXT | 7.21EXT
  • KRNL64UC | 7.20 | 7.20
  • KRNL64UC | 7.20EXT | 7.20EXT
  • KRNL64UC | 7.21 | 7.21
  • KRNL64UC | 7.21EXT | 7.21EXT
  • KRNL64UC | 7.38 | 7.38
  • KERNEL | 7.20 | 7.21
  • SAP KERNEL 7.20 32-BIT | SP310 | 000310
  • SAP KERNEL 7.20 32-BIT | SP314 | 000314
  • SAP KERNEL 7.20 32-BIT UNICODE | SP310 | 000310
  • SAP KERNEL 7.20 32-BIT UNICODE | SP314 | 000314
  • SAP KERNEL 7.20 64-BIT | SP310 | 000310
  • SAP KERNEL 7.20 64-BIT | SP314 | 000314
  • SAP KERNEL 7.20 64-BIT UNICODE | SP310 | 000310
  • SAP KERNEL 7.20 64-BIT UNICODE | SP314 | 000314
  • SAP KERNEL 7.21 32-BIT | SP020 | 000020
  • SAP KERNEL 7.21 32-BIT | SP028 | 000028
  • SAP KERNEL 7.21 32-BIT UNICODE | SP020 | 000020
  • SAP KERNEL 7.21 32-BIT UNICODE | SP028 | 000028
  • SAP KERNEL 7.21 64-BIT | SP020 | 000020
  • SAP KERNEL 7.21 64-BIT | SP028 | 000028
  • SAP KERNEL 7.21 64-BIT UNICODE | SP020 | 000020
  • SAP KERNEL 7.21 64-BIT UNICODE | SP028 | 000028
  • SAP KERNEL 7.21 EXT 32-BIT | SP020 | 000020
  • SAP KERNEL 7.21 EXT 32-BIT | SP028 | 000028
  • SAP KERNEL 7.21 EXT 32-BIT UC | SP020 | 000020
  • SAP KERNEL 7.21 EXT 32-BIT UC | SP028 | 000028

Affected component

    BC-CST-DP
    Dispatcher, Task Handler

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1741793

TAGS

#Memory-corruption
#work-process

Explore More

SAP Security Advisory – CVE-2025-42890

Critical Hard-Coded Credentials Vulnerability in SQL Anywhere Monitor (Non-GUI) CVSS Score10.0 SeverityCRITICAL PriorityHotNews PublishedNov 11, 2025 🚨 Critical Alert IMMEDIATE ACTION REQUIRED:

SAP Security Patch Day RedRays

SAP security patches November 2025

SAP has released its November 2025 security patch package containing 20 security notes addressing critical vulnerabilities across enterprise SAP environments. This release