An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 08 Jul 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability. | |
Title | Missing Authentication check after implementation of SAP Security Note 3007182 and 3537476 | |
Weaknesses | CWE-308 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: sap
Published: 2025-07-08T00:35:03.181Z
Updated: 2025-07-11T03:55:25.728Z
Reserved: 2025-04-16T13:25:39.584Z
Link: CVE-2025-42959

Updated: 2025-07-08T14:31:06.483Z

Status : Awaiting Analysis
Published: 2025-07-08T01:15:22.477
Modified: 2025-07-08T16:18:14.207
Link: CVE-2025-42959

No data.