Anatomy of a Breach

Anatomy of a Breach: SAP NetWeaver — Critical Vulnerability in Enterprise Backbone Exploited at Scale

> series: anatomy_of_a_breach —— part: 198 —— target: sap_netweaver —— organisations: 400,000 —— risk: core_business_operations<span class="cursor-blink">_</span>_

Hedgehog Security 30 June 2025 12 min read

SAP NetWeaver. 400,000 organisations. The enterprise backbone under active attack.

In mid-2025, multiple threat actors began actively exploiting a critical vulnerability in SAP NetWeaver — the application server platform that underpins SAP's enterprise resource planning (ERP) systems. SAP is used by approximately approximately 400,000 organisations worldwide — including the majority of the world's largest companies — to run core business functions: finance and accounting, supply chain management, human resources, manufacturing execution, and procurement. A vulnerability in NetWeaver represented a vulnerability in the operational backbone of global business.

SAP released patches, but the exploitation window — between vulnerability discovery and patch application — created significant risk for organisations with complex SAP landscapes that could not be patched immediately. The incident echoed previous mass exploitation events targeting enterprise infrastructure: Microsoft Exchange/Hafnium (2021), MOVEit (2023), and the Log4Shell (2021) vulnerability — all cases where critical vulnerabilities in widely-deployed enterprise software created mass exploitation opportunities. The M&S breach was subsequently linked to an unpatched NetWeaver vulnerability, demonstrating the real-world consequences of delayed patching.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

When your ERP is compromised, everything stops.

SAP = Core Business Operations
SAP systems manage payroll, procurement, manufacturing, supply chain, and financial reporting. A compromise of SAP can halt business operations across every function simultaneously. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> includes SAP and ERP security assessment.
Patch Complexity in ERP Environments
SAP landscapes are complex, customised, and business-critical — making patching slower than for standard software. <a href="/cyber-essentials">Cyber Essentials Danzell's</a> 14-day patching mandate must be achievable even for complex ERP environments. <a href="/vulnerability-scanning">Vulnerability scanning</a> identifies unpatched SAP components.
Internet-Facing SAP Components
Some SAP NetWeaver components — including web dispatchers and portal interfaces — are exposed to the internet. When critical vulnerabilities exist in internet-facing SAP components, they become immediate targets for mass exploitation. Our <a href="/vulnerability-scanning">external vulnerability scanning</a> identifies exposed enterprise application servers.
Enterprise Software as Critical Infrastructure
SAP, Oracle, Microsoft — enterprise software platforms are as critical to business operations as electricity and telecommunications. Their security must be treated with proportionate rigour. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors enterprise application access patterns for anomalies. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides incident response for enterprise platform compromises.

Your ERP is your business. Patch it. Test it. Monitor it.

The SAP NetWeaver exploitation demonstrated that enterprise application platforms require the same patching urgency as operating systems and network devices. Cyber Essentials mandates 14-day patching. Vulnerability scanning identifies unpatched SAP components. Infrastructure testing assesses ERP security. SOC in a Box monitors for exploitation attempts. And UK Cyber Defence provides incident response when enterprise platforms are compromised.


SAP NetWeaver under active attack. Is your ERP patched and tested?

<a href="/vulnerability-scanning">Vulnerability scanning</a> identifies unpatched SAP. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses ERP security. <a href="/cyber-essentials">Cyber Essentials</a> mandates patching.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles