SAP Shares Slide 1.1% as Cybersecurity Flaw Sparks Market Turmoil Surging $460M Volume Propels Stock to 217th in Activity

Generated by AI AgentVolume Alerts
Friday, Sep 5, 2025 7:40 pm ET1min read
Aime RobotAime Summary

- SAP shares dropped 1.1% on Sept. 5 amid urgent warnings over a critical code injection vulnerability (CVE-2025-42957) in its S/4HANA ERP system.

- The flaw, patched in August 2025, allows attackers to execute arbitrary ABAP code via low-privileged access, enabling data theft and system compromise.

- Cybersecurity firms confirmed active exploitation attempts, with SAP urging immediate patching and enhanced monitoring for affected S4CORE versions 102-108.

- Surging $460M trading volume propelled SAP to 217th in market activity, reflecting heightened investor concern over the high-severity (CVSS 9.9) vulnerability.

. , . The stock's decline follows urgent cybersecurity warnings about a critical vulnerability in its flagship S/4HANA ERP system.

A high-severity code injection flaw () has been actively exploited in the wild, allowing attackers to inject arbitrary ABAP code into

environments. The vulnerability, , enables full system compromise through low-privileged user access, enabling data theft, privilege escalation, and process manipulation. confirmed exploitation attempts in both on-premise and private cloud deployments, noting the patch could be reverse-engineered with relative ease.

Multiple cybersecurity firms have issued alerts. The Dutch warned of limited-scale attacks, while observed a surge in exploitation attempts post-patch release. SAP recommended immediate patch application, implementation of UCON for RFC restrictions, and enhanced monitoring for suspicious activity. The vulnerability affects S4CORE versions 102-108, .

Back-test parameters: Russell 3000 constituents ranked daily by share volume; top 500 stocks bought at close, sold next day at close. , , , . Default setup includes no adjustments to universe, price convention, or volume metric definitions.

Comments



Add a public comment...
No comments

No comments yet