WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) Critical Zero Day Vulnerabilities in SAP NetWeaver Servers, One Actively Exploited
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Critical Zero Day Vulnerabilities in SAP NetWeaver Servers, One Actively Exploited

TLP:CLEAR

Author: Chase Snow

Created: Thursday, May 15, 2025 - 14:31

Categories: Cybersecurity, Security Preparedness

Summary: A recently disclosed zero day vulnerability in SAP NetWeaver is being actively exploited by multiple Chinese nation-state threat actors, specifically UNC5521, UNC5174, and CL-STA-0048 to target critical infrastructure networks. The vulnerability tracked as CVE-2025-31324 has a CVSS score of 10.0, and is an unauthenticated file upload vulnerability that enables remote code execution (RCE). Research from cybersecurity firm EclecticIQ indicates that targets of the campaign include natural gas distribution networks, water and integrated waste management utilities, and other critical infrastructure sectors in the United States and abroad.

Another vulnerability in NetWeaver (CVE-2025-42999) was also exploited in the wild. Cybersecurity firm Onapsis has indicated that threat actors were chaining both vulnerabilities in attacks since January. It was noted that the combination allowed attackers to remotely execute arbitrary commands without any privileges on the systems.

Analyst Note: WaterISAC is aware that SAP NetWeaver itself is not broadly or directly used as a core system in the water sector. However, SAP technologies built on NetWeaver (such as SAP ERP, SAP S/4HANA, or SAP Utilities) are used by several large water utilities, particularly in areas like asset management, billing and customer service, supply chain and procurement, workforce management, and regulatory compliance reporting. WaterISAC urges members to verify if they use technologies built on SAP NetWeaver and to update their instances to the latest version as soon as possible.

Original Source: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/may-2025.html

Additional Reading:

  • China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures
  • China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide
  • SAP patches second zero-day flaw exploited in recent attacks

Mitigation Recommendations:

  • SAP Security Patch Day – May 2025

Related WaterISAC PIRs: 6, 7, 8, 10, 12

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar