CVE-2025-0067
Description
Due to a missing authorization check on service endpoints in the SAP NetWeaver Application Server Java, an attacker with standard user role can create JCo connection entries, which are used for remote function calls from or to the application server. This could lead to low impact on confidentiality, integrity, and availability of the application.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing authorization check in SAP NetWeaver AS Java allows standard users to create JCo connections, enabling low-impact attacks on confidentiality, integrity, and availability.
Vulnerability
Details
A missing authorization check on service endpoints in SAP NetWeaver Application Server Java allows an attacker with a standard user role to create JCo connection entries. JCo (Java Connector) is used for remote function calls (RFC) from or to the application server. This flaw stems from insufficient access control on the relevant service endpoints, enabling unauthorized creation of these connections.
Exploitation
An attacker must have a standard user role on the SAP system, which is a low-privilege account. No additional authentication is required beyond that role. The attack can be performed remotely over the network, likely through the application's web interface or RFC gateway. The attacker can create JCo connection entries that may be used to initiate or receive remote function calls.
Impact
Successful exploitation leads to low impact on confidentiality, integrity, and availability of the application. The attacker could potentially manipulate RFC connections to intercept or alter data, or disrupt communication between systems. However, the impact is limited due to the low severity rating.
Mitigation
SAP has addressed this vulnerability through its regular Security Patch Day. Administrators should apply the relevant SAP Security Notes as soon as possible to protect their systems. [1] The vendor recommends implementing these corrections at a priority to prevent potential exploitation.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.