The global and independent platform for the SAP community.

ERP Systems in the Crosshairs

A recent SAP zero-day vulnerability shows how quickly ERP systems can be targeted. Companies must strategically safeguard security, compliance and cloud models such as Rise—from patching and monitoring to the clear allocation of responsibilities.
Volker Eschenbaecher, Onapsis
October 16, 2025
avatar
This text has been automatically translated from German to English.

The incident surrounding CVE-2025-31324 in SAP NetWeaver Visual Composer in the spring of this year began like many security reports: as a technical note that only seemed to concern specialists. A few days later, it became apparent that the vulnerability had been exploited on a large scale. The CVSS score of 10 signaled that this was one of the most dangerous vulnerabilities known in ERP systems in recent years.

Prepared HTTP requests

Attackers specifically exploited the gap to inject malicious code via prepared HTTP requests, install web shells and thus establish long-term remote access - among other things, to be able to access sensitive data. Not only productive systems were affected, but also test and development systems that were accessible via the internet. Particularly sensitive: Even in cloud scenarios such as in Rise environments, where Visual Composer was not officially used, the component was installed - and the system was therefore theoretically vulnerable. This shows that attackers no longer only target productive core modules, but also use peripheral components as a gateway into the heart of the ERP landscape.

A successful attack on an ERP system is rarely limited to one area. In the example of a manufacturing company, production lines can come to a standstill, deliveries can be delayed, stock levels can be displayed incorrectly or orders can be executed incorrectly. In the very worst case, the incident spreads along the supply chain - and also affects partners and customers.

In a networked world, the failure of an ERP system can cause lasting damage to a company's reputation. Listed companies also risk a loss in share price if attacks become public. Compliance obligations such as reporting deadlines to supervisory authorities add to the pressure. Strategic security is therefore the be-all and end-all.

The limits of cloud trust

For many companies, Rise with SAP is the key to modernizing their ERP landscape. The provider takes over the infrastructure, operating system and database patches, which frees up resources. But this is precisely where the pitfall lies: security responsibility does not end at the edge of the provider stack.

Everything that goes beyond the basic infrastructure, such as customer-specific extensions, roles and authorizations, interfaces to partners and external applications, is the responsibility of the company.

Zero-day case

The zero-day case makes it clear that gaps can occur anywhere and threaten the entire company - even in areas that are not actively used. If all systems and interfaces are not regularly checked and patched, an unnoticed attack surface is created that grows and grows.

In practice, companies are therefore increasingly relying on automated vulnerability scans and continuous monitoring solutions, such as those provided by specialized providers like Onapsis.
Such tools help to keep an eye on even complex Rise environments around the clock and at the same time relieve the burden on security teams - an important factor not only with regard to increasingly complex attacks, but also in view of increasing requirements and the shortage of specialists in IT security.

The migration to Rise with SAP is not only a technically necessary project, but also an opportunity to identify and eliminate legacy issues. In practice, however, complete systems are often transferred "lift-and-shift" - including outdated custom codes, unused modules and open interfaces.

Legacy issues in our sights

These legacy systems are an attractive target for attackers. They often contain known but unpatched code, which poses a high risk to the system, and their protection falls through the cracks if the focus is exclusively on the new platform.

A thorough inventory before systems go into the cloud is therefore essential in order to gain transparency and eliminate any applications, custom codes, interfaces and similar that are not (or no longer) in use. Inventory and analysis tools support ERP teams in identifying and prioritizing potential risks before they become weak points.

High-risk ERP environment

ERP systems are increasingly being targeted by organized cybercrime. In addition to targeted attacks by private attackers and state-sponsored groups, ransomware campaigns are also on the rise, which specifically paralyze business processes to support ransom demands.

Attackers are increasingly using combinations: First, for example, initial access is gained via an unpatched vulnerability, then authorizations are extended, data is siphoned off and - often weeks later - the systems are encrypted. This step-by-step approach makes detection more difficult and increases the damage.

In the worst case, the attack is only noticed at the moment of encryption. Then, when it is already too late and sensitive information has already been circulated.
Up-to-date threat information from specialized research laboratories, such as the Onapsis Research Labs, can help to identify new attack patterns at an early stage and initiate countermeasures before damage occurs.

They provide comprehensive information about their observations in real time and give recommendations for action to protect companies and their ERP systems in the best possible way.
Vulnerabilities such as the zero-day vulnerability outlined at the beginning of the article illustrate the importance of fast response times. Attackers often start searching for vulnerable systems just hours after exploit details are published.

Companies that need too much time for testing, approvals and therefore patching are significantly increasing their risk. This is where automation plays a key role. Automated solutions can prioritize patches and configuration changes, analyze dependencies and document implementation - which not only increases speed, but also supports audit requirements. Especially in times of scarce personnel resources, this relief is also a decisive advantage.

Monitoring and analytics

The amount of data in Rise or hybrid ERP environments is enormous. Without intelligent analysis, "noise" can easily arise in which real threats are lost. Appropriate automated analysis processes can identify patterns here that would hardly be visible manually - such as unusual access patterns to certain tables or a sudden accumulation of failed logins from geographically distant regions. Providers such as Onapsis combine such analysis functions with threat information from their own research labs. This allows detected anomalies to be evaluated not only technically, but also in the context of current attack campaigns. This makes it possible to determine more quickly whether an incident is isolated or part of a larger, coordinated wave of attacks.

Compliance as a driver

If, for example, a globally active chemical company discovers that an ERP interface to a laboratory system is connected to the internet without protection, this can not only jeopardize production processes but also violate environmental regulations. A retail company whose cloud ERP is accessible via insecure API endpoints risks not only financial losses but also long-term reputational damage. Such scenarios are realistic - and avoidable.

In addition, regulatory requirements such as the European Union's NIS2 Directive, industry-specific security standards and international norms are increasing the pressure to reliably protect ERP systems and sensitive data. Those who act proactively here not only reduce the risk of fines, but also create a resilient security architecture.

These compliance frameworks act as a catalyst: they force organizations to document their security processes, define responsibilities and carry out regular reviews. But this alone does not protect. If audits are only formally fulfilled while real security gaps remain, a false sense of security is created. An integrated approach that dovetails compliance requirements and technical protection measures - supported by continuous, automated checks - is therefore crucial.


Conclusion: Proactivity as a guiding principle

ERP security must not be reduced to simply applying patches. It is necessary to establish a continuous process: regular inventories and assessments, risk analyses, training and the close integration of IT and specialist departments. Cloud models such as Rise with SAP do nothing to change this. On the contrary: they require security processes to function seamlessly across company boundaries - from the provider to internal IT teams and external partners. Only those who approach their ERP security proactively and strategically, supported by modern automation and sound threat intelligence, can remain capable of acting in a threat situation such as the one that is omnipresent today.


avatar
Volker Eschenbaecher, Onapsis


Write a comment

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the second time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork.

Venue

FourSide Hotel Salzburg,
Trademark Collection by Wyndham
Am Messezentrum 2, 5020 Salzburg, Austria
+43-66-24355460

Event date

Wednesday, June 10, and
Thursday, June 11, 2026

Early Bird Ticket

Regular ticket

Subscribers to the E3 Magazine Ticket

reduced with promocode STAbo26

Students*

reduced with promocode CCStud26.
Please send proof of studies by e-mail to office@b4bmedia.net.
*The first 10 tickets are free of charge for students. Try your luck! 🍀
EUR 390 excl. VAT
available until November 30, 2025
EUR 590 excl. VAT
EUR 390 excl. VAT
EUR 290 excl. VAT

Venue

Hotel Hilton Heidelberg
Kurfürstenanlage 1
D-69115 Heidelberg

Event date

Wednesday, April 22 and
Thursday, April 23, 2026

Tickets

Early Bird Ticket
Regular ticket
EUR 390 excl. VAT
available until 30.11.2025
EUR 590 excl. VAT
Subscribers to the E3 magazine
reduced with promocode STAbo26
EUR 390 excl. VAT
Students*
reduced with promocode STStud26.
Please send proof of studies by e-mail to office@b4bmedia.net.
EUR 290 excl. VAT
*The first 10 tickets are free of charge for students. Try your luck! 🍀
The event is organized by the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes attendance at all presentations of the Steampunk and BTP Summit 2026, a visit to the exhibition area, participation in the evening event and catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due course.