“This vulnerability can fill a significant difference in an attacker’s arsenal to attack these systems,” he said, “he said. “They will still need some credentials, but they may be low-level credentials that they get through any other attack.”
The platform complexity leads to potential weaknesses
There is no stranger for SAP S/4hana weaknesses. In April, for example, a cross-site request forgery vulnerability (CVE-2025-31328) S/4hana was discovered in the Learning Solution module. In February, an open revision vulnerability was found in the Advanced Application (XS) services advanced models (XS) services of S/4hana, which allows a malicious link to craft a malicious link to a malicious link that rejuvenates an unknown hunt on an evil website.
Eric MehlerA German-based CISO, which blogs on general security weaknesses in S/4hana, wrote that the complexity of the forum can introduce potential security weaknesses, often caused by misunderstanding or inspection. These issues include laying default SAP accounts that still use default passwords and highly user permissions, allowing SAP traffic or traffic with old protocols such as TLS 1.0, insufficient traffic monitoring and logging, and unsafe ABAP programming practices.