INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 9h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 9h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 9h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h
Vulnerabilities

CVE-2017-12637

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
SAP NetWeaver Directory Traversal Vulnerability — SAP NetWeaver Application Server (AS) Java contains a directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS that al
Published: Mar 19, 2025  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

SAP NetWeaver Directory Traversal Vulnerability — SAP NetWeaver Application Server (AS) Java contains a directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS that allows a remote attacker to read arbitrary files via a .. (dot dot) in the query string.

🤖 AI Executive Summary

CVE-2017-12637 is a critical directory traversal vulnerability in SAP NetWeaver Application Server Java that allows remote attackers to read arbitrary files from the server by manipulating the query string with path traversal sequences. With a CVSS score of 9.0 and publicly available exploits, this vulnerability poses an immediate threat to any exposed SAP NetWeaver AS Java instance. Attackers can leverage this to access sensitive configuration files, credentials, and other critical data without authentication. This vulnerability has been actively exploited in the wild and is listed in CISA's Known Exploited Vulnerabilities catalog.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 8, 2026 02:49
🇸🇦 Saudi Arabia Impact Assessment
هذه الثغرة ذات تأثير بالغ على المؤسسات السعودية نظراً للانتشار الواسع لأنظمة SAP في المملكة. القطاعات الأكثر تعرضاً تشمل: القطاع المصرفي (البنوك الخاضعة لرقابة ساما التي تعتمد بشكل كبير على SAP للعمليات المالية)، قطاع الطاقة (أرامكو وسابك وشركات البتروكيماويات التي تستخدم SAP كنظام ERP أساسي)، القطاع الحكومي (الوزارات والهيئات الحكومية التي تستخدم SAP للموارد البشرية والمالية)، وقطاع الاتصالات (STC وزين وموبايلي). يمكن أن يؤدي الاستغلال إلى تسريب بيانات حساسة تشمل معلومات مالية وبيانات موظفين وأسرار تجارية، مما يشكل تهديداً مباشراً للأمن الوطني والاقتصادي.
🏢 Affected Saudi Sectors
Banking Energy Government Telecommunications Healthcare Petrochemicals Retail Manufacturing
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Apply SAP Security Note 2486657 immediately to patch this vulnerability
2. Identify all SAP NetWeaver AS Java instances in your environment using asset discovery tools
3. Check if the vulnerable endpoint /scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS is accessible externally and block it immediately at the WAF/reverse proxy level

Patching Guidance:
1. Download and apply the official SAP patch from SAP Support Portal
2. Test the patch in a non-production environment before deploying to production
3. Restart SAP services after applying the patch

Compensating Controls:
1. Implement WAF rules to block directory traversal patterns (../, ..\, %2e%2e) in requests to SAP NetWeaver
2. Restrict network access to SAP NetWeaver AS Java to only authorized IP ranges
3. Disable the scheduler service if not required
4. Enable detailed access logging on SAP NetWeaver

Detection Rules:
1. Monitor web server logs for requests containing '../' or URL-encoded variants targeting /scheduler/ui/js/ paths
2. Create SIEM alerts for unusual file access patterns from SAP application server processes
3. Deploy IDS/IPS signatures for CVE-2017-12637 exploitation attempts
4. Monitor for access to sensitive files such as /etc/passwd, SAP configuration files, or credential stores
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تطبيق ملاحظة أمان SAP رقم 2486657 فوراً لإصلاح هذه الثغرة
2. تحديد جميع مثيلات SAP NetWeaver AS Java في بيئتكم باستخدام أدوات اكتشاف الأصول
3. التحقق مما إذا كانت نقطة النهاية الضعيفة /scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS متاحة خارجياً وحظرها فوراً على مستوى جدار حماية تطبيقات الويب

إرشادات التصحيح:
1. تنزيل وتطبيق التصحيح الرسمي من بوابة دعم SAP
2. اختبار التصحيح في بيئة غير إنتاجية قبل النشر في بيئة الإنتاج
3. إعادة تشغيل خدمات SAP بعد تطبيق التصحيح

الضوابط التعويضية:
1. تنفيذ قواعد جدار حماية تطبيقات الويب لحظر أنماط اجتياز المسار في الطلبات الموجهة لـ SAP NetWeaver
2. تقييد الوصول الشبكي إلى SAP NetWeaver AS Java للنطاقات المصرح بها فقط
3. تعطيل خدمة المجدول إذا لم تكن مطلوبة
4. تفعيل التسجيل التفصيلي للوصول على SAP NetWeaver

قواعد الكشف:
1. مراقبة سجلات خادم الويب للطلبات التي تحتوي على '../' أو المتغيرات المشفرة
2. إنشاء تنبيهات SIEM لأنماط الوصول غير العادية للملفات
3. نشر توقيعات IDS/IPS لمحاولات استغلال CVE-2017-12637
4. مراقبة الوصول إلى الملفات الحساسة مثل ملفات التكوين وبيانات الاعتماد
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2-3-1 (Vulnerability Management) ECC-2-3-4 (Patch Management) ECC-2-5-1 (Web Application Security) ECC-2-2-1 (Network Security) ECC-2-7-1 (Security Monitoring and Event Management)
🔵 SAMA CSF
3.3.3 (Vulnerability Management) 3.3.4 (Patch Management) 3.3.5 (Secure Configuration) 3.4.1 (Security Event Monitoring) 3.3.7 (Application Security)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.9 (Configuration management) A.8.16 (Monitoring activities) A.8.23 (Web filtering) A.5.7 (Threat intelligence)
🟣 PCI DSS v4.0
6.3.3 (Install critical security patches within one month) 6.4 (Web application firewall requirements) 11.3 (Penetration testing) 10.6 (Review logs and security events) 2.2 (Configuration standards)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
SAP:NetWeaver
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS93.22%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2025-04-09
Published 2025-03-19
Source Feed cisa_kev
Views 2
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.