Alert
Number: AL25-006
Date: May 21, 2025
Audience
This Alert is intended for IT professionals and managers of notified organizations.
Purpose
An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.
Details
On April 24, 2025, SAP released an emergency update for a critical vulnerability , CVE-2025-31324, affecting the following productFootnote 1:
- SAP NetWeaver (Visual Composer development server) – version VCFRAMEWORK 7.50
This vulnerability can be exploited to allow an unauthenticated threat actor to upload arbitrary files to the affected systemFootnote 2.
On May 13, 2025, SAP released a security advisory addressing another critical vulnerability CVE-2025-42999. The patch for this vulnerability removes residual risk that remained after patching CVE-2025-31324Footnote 3Footnote 4. On May 15, 2025, CISA added CVE-2025-3124 and CVE-2025-42999 to their Known Exploited Vulnerabilities (KEV) CatalogFootnote 9.
The Cyber Centre is aware of reports that CVE-2025-31324 has been actively exploited since March 2025Footnote 4Footnote 5.
Indicators Of Compromise (IOCs)
The IOCs reported in the following URLs are associated with exploitation of this vulnerability:
Onapsis-Mandiant-CVE-2025-31324-Vuln-Compromise-Assessment
SAP NetWeaver Flaw Lets Threat Actors Take Full Control: CVE-2025-31324 and CVE-2025-42999 Explained
ReliaQuest Uncovers New Critical Vulnerability in SAP NetWeaver
Critical vulnerability in SAP NetWeaver enables malicious file uploads
Suggested Actions
The Cyber Centre strongly recommends that organizations using SAP NetWeaver review the SAP Security Notes 3594142 and 3604119Footnote 6Footnote 7 and apply the necessary updates and mitigations to address these vulnerabilities.
Restrict access to the /developmentserver/metadatauploader endpoint using firewall policies or SAP Web Dispatcher. Block unauthenticated or public network access and limit internal access to authorized administrators.
Execute in-depth investigations in potentially exposed and vulnerable SAP systems, searching for known IoCs. Please consider that threat actors may have performed post-exploitation activity “living-off-the-land” (LoTL), without the deployment of webshells.
The indicators of compromise (IOCs) are being provided as is by the Cyber Centre for situational awareness and potential action. As some of the indicators provided may be legitimate software or infrastructure, or may be otherwise used for legitimate purposes, the detection or presence of activity related to these indicators does not necessarily imply a compromise. These indicators should be treated in an investigative, forensic or threat hunting context and used in conjunction with one another, particularly if evidence of the activity described in this alert is observed Footnote 4Footnote 5. It is important to verify business services and network environments before implementing any blocks based on these indicators.
In addition, the Cyber Centre strongly recommends that organizations review and implement the Cyber Centre’s Top 10 IT Security ActionsFootnote 8
If activity matching the content of this alert is discovered, recipients are encouraged to report via the My Cyber Portal, or email contact@cyber.gc.ca.