In a recent report, cybersecurity researchers have disclosed two security flaws in SAP Graphical User Interface (GUI) for Windows and Java that have since been patched by SAP. The vulnerabilities, known as CVE-2025-0055 and CVE-2025-0056, could have allowed attackers to access sensitive information stored in the input history feature of SAP GUI under certain conditions. This input history feature allows users to access previously entered values in input fields, potentially including usernames, national IDs, social security numbers, bank account numbers, and internal SAP table names.
The vulnerabilities identified by Pathlock stem from the insecure storage of input history in both the Java and Windows versions of SAP GUI. The historical information is stored locally on devices in predefined directories based on the SAP GUI variant, making it accessible to attackers with administrative privileges or access to the victim’s user directory. The issue lies in the weak XOR-based encryption scheme used by SAP GUI for Windows and the unencrypted storage of historical entries as Java serialized objects in SAP GUI for Java.
To mitigate the risks associated with potential information disclosure, users are advised to disable the input history functionality and delete existing database or serialized object files from the specified directories. Meanwhile, Citrix has patched a critical security flaw in NetScaler (CVE-2025-5777) that could be exploited by threat actors to gain access to vulnerable appliances. The vulnerability, codenamed Citrix Bleed 2, allows unauthorized attackers to grab valid session tokens from memory via malformed requests, bypassing authentication protections.
Citrix has addressed the vulnerability in various versions of NetScaler ADC and NetScaler Gateway, urging users to upgrade to the supported versions and terminate all active ICA and PCoIP sessions after upgrading. While there is no evidence of exploitation yet, cybersecurity experts warn that CVE-2025-5777 is shaping up to be as serious as CitrixBleed, a vulnerability that caused havoc in 2023. The details surrounding the vulnerability have evolved since its disclosure, indicating that it may be more severe than initially thought.
Source link
