The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component within the affected SRM stack to accept binary Java objects in specific encoding format. On successful exploitation, an authenticated attacker with high privileges could send malicious payload request and receive an outbound DNS request, resulting in deserialization of data in the application. This vulnerability has low impact on confidentiality, integrity and availability of the application.
Metrics
Affected Vendors & Products
References
History
Tue, 13 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 13 May 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component within the affected SRM stack to accept binary Java objects in specific encoding format. On successful exploitation, an authenticated attacker with high privileges could send malicious payload request and receive an outbound DNS request, resulting in deserialization of data in the application. This vulnerability has low impact on confidentiality, integrity and availability of the application. | |
Title | Multiple vulnerabilities in SAP Supplier Relationship Management (Live Auction Cockpit) | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: sap
Published: 2025-05-13T00:14:21.258Z
Updated: 2025-05-13T14:12:24.560Z
Reserved: 2025-03-13T18:03:35.488Z
Link: CVE-2025-30012

Updated: 2025-05-13T14:12:18.156Z

Status : Awaiting Analysis
Published: 2025-05-13T01:15:47.833
Modified: 2025-05-13T19:35:25.503
Link: CVE-2025-30012

No data.