CVE-2025-0055 Overview
SAP GUI for Windows contains an information disclosure vulnerability that exposes sensitive user input data stored locally on client PCs. The vulnerability exists in the application's usability optimization feature, which caches user input on the local file system. Under specific circumstances, an attacker with administrative privileges or direct access to the victim's user directory at the operating system level can read this cached data, potentially exposing highly sensitive information entered during SAP transactions.
Critical Impact
An attacker with local access could exfiltrate sensitive data ranging from non-critical information to highly confidential business data entered during SAP transactions, resulting in significant confidentiality impact.
Affected Products
- SAP GUI for Windows (versions affected as per SAP Note #3472837)
Discovery Timeline
- January 14, 2025 - CVE-2025-0055 published to NVD
- January 14, 2025 - Last updated in NVD database
Technical Details for CVE-2025-0055
Vulnerability Analysis
This vulnerability is classified under CWE-497 (Exposure of Sensitive System Information to an Unauthorized Control Sphere). SAP GUI for Windows implements a local caching mechanism designed to enhance user experience by storing transaction input data on the client PC. However, this convenience feature creates a security exposure when the stored data is not adequately protected from unauthorized access.
The vulnerability requires local access to the victim's system, specifically to the user directory where SAP GUI stores cached transaction data. While the attack complexity is low once access is obtained, the prerequisite of administrative privileges or direct file system access limits the attack surface. The impact is confined to confidentiality—no integrity or availability impact has been identified—but the potential exposure of sensitive business data entered in SAP transactions makes this a significant concern for enterprise environments.
Root Cause
The root cause of CVE-2025-0055 lies in the inadequate protection of locally stored user input data. SAP GUI for Windows caches transaction input to improve usability, but this cached data lacks sufficient access controls or encryption to prevent unauthorized reading by privileged local users or attackers who have gained access to the user's directory structure.
Attack Vector
The attack vector is local, requiring the adversary to have either administrative privileges on the target system or direct access to the victim's user directory at the operating system level. This could occur through:
- A malicious insider with legitimate administrative access to corporate workstations
- An attacker who has already compromised the target system through other means
- Physical access to an unlocked or inadequately secured workstation
- Unauthorized access to network file shares containing user profile directories
Once access is obtained, the attacker can navigate to the SAP GUI data storage location and read cached transaction data, which may contain sensitive business information depending on the transactions performed by the user.
Detection Methods for CVE-2025-0055
Indicators of Compromise
- Unusual file access patterns in SAP GUI user data directories
- Unauthorized access attempts to user profile directories containing SAP GUI cache
- Suspicious administrative account activity targeting multiple user directories
- Anomalous data exfiltration from workstations running SAP GUI
Detection Strategies
- Monitor file access events on directories where SAP GUI stores user input cache data
- Implement endpoint detection rules for bulk reading of SAP GUI configuration files
- Alert on administrative account usage patterns that indicate directory enumeration across user profiles
- Deploy file integrity monitoring on sensitive SAP GUI data directories
Monitoring Recommendations
- Enable detailed file system auditing for SAP GUI user directories
- Configure SIEM rules to correlate file access events with user activity baselines
- Implement privileged access monitoring for administrative accounts
- Review access logs for SAP GUI installation and user data directories regularly
How to Mitigate CVE-2025-0055
Immediate Actions Required
- Apply the security patch referenced in SAP Note #3472837 immediately
- Review and restrict administrative access to workstations running SAP GUI
- Audit user directory permissions to ensure principle of least privilege
- Enable file system auditing on SAP GUI data directories to detect unauthorized access attempts
Patch Information
SAP has released a security update addressing this vulnerability. Organizations should consult SAP Note #3472837 for detailed patching instructions and version-specific guidance. The patch is part of the SAP Security Patch Day releases.
Workarounds
- Restrict administrative privileges to essential personnel only
- Implement strong access controls on user profile directories
- Consider encrypting user home directories using BitLocker or similar full-disk encryption
- Clear SAP GUI cache data periodically on sensitive workstations
- Implement network segmentation to limit lateral movement that could lead to directory access
# Example: Enable auditing on Windows for SAP GUI user directories
# Run in elevated PowerShell
$path = "C:\Users\*\AppData\*\SAP"
$acl = Get-Acl $path
$auditRule = New-Object System.Security.AccessControl.FileSystemAuditRule("Everyone","Read","Success")
$acl.AddAuditRule($auditRule)
Set-Acl $path $acl
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


