Remote Code Execution Vulnerability in SAP jConnect Affecting High Privileged Users
CVE-2025-42928
9.1CRITICAL
What is CVE-2025-42928?
A deserialization vulnerability in SAP jConnect can enable high privileged users to execute remote code under specific conditions. Exploiting this flaw involves using specially crafted input, potentially compromising the confidentiality, integrity, and availability of the affected system. Organizations utilizing SAP jConnect should promptly apply security updates to mitigate this risk. For more details and patch information, refer to the official SAP security patches and notes.
Affected Version(s)
SAP jConnect - SDK for ASE SYBASE_SOFTWARE_DEVELOPER_KIT 16.0.4
SAP jConnect - SDK for ASE 16.1
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved