> series: anatomy_of_a_breach —— part: 198 —— target: sap_netweaver —— organisations: 400,000 —— risk: core_business_operations<span class="cursor-blink">_</span>_
In mid-2025, multiple threat actors began actively exploiting a critical vulnerability in SAP NetWeaver — the application server platform that underpins SAP's enterprise resource planning (ERP) systems. SAP is used by approximately approximately 400,000 organisations worldwide — including the majority of the world's largest companies — to run core business functions: finance and accounting, supply chain management, human resources, manufacturing execution, and procurement. A vulnerability in NetWeaver represented a vulnerability in the operational backbone of global business.
SAP released patches, but the exploitation window — between vulnerability discovery and patch application — created significant risk for organisations with complex SAP landscapes that could not be patched immediately. The incident echoed previous mass exploitation events targeting enterprise infrastructure: Microsoft Exchange/Hafnium (2021), MOVEit (2023), and the Log4Shell (2021) vulnerability — all cases where critical vulnerabilities in widely-deployed enterprise software created mass exploitation opportunities. The M&S breach was subsequently linked to an unpatched NetWeaver vulnerability, demonstrating the real-world consequences of delayed patching.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe SAP NetWeaver exploitation demonstrated that enterprise application platforms require the same patching urgency as operating systems and network devices. Cyber Essentials mandates 14-day patching. Vulnerability scanning identifies unpatched SAP components. Infrastructure testing assesses ERP security. SOC in a Box monitors for exploitation attempts. And UK Cyber Defence provides incident response when enterprise platforms are compromised.
<a href="/vulnerability-scanning">Vulnerability scanning</a> identifies unpatched SAP. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses ERP security. <a href="/cyber-essentials">Cyber Essentials</a> mandates patching.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call