In this week’s Security Advisory

  • SAP Patches Critical NetWeaver Vulnerabilities
  • Veeam Patches Three Vulnerabilities in Backup & Replication
  • Fortinet Patches High-Severity Vulnerabilities
  • Microsoft’s October Patch Tuesday Release
  • Juniper Networks October Patch Release
  • Security Updates for Adobe

SAP Patches Critical NetWeaver Vulnerabilities

SAP has released 16 new patches in its October Patch Cycle, including another fix for CVE-2025-42944 (CVSS 10/10). This is described as a deserialization vulnerability in NetWeaver that can be exploited by an unauthenticated user. These patches also resolve two more critical vulnerabilities, CVE-2025-42937 (CVSS 9.8) and CVE-2025-42910 (CVSS 9.0).

More Reading / Information

Original Advisory:

SAP has patched three critical severity vulnerabilities, CVE-2025-42944 (CVSS 10/10), CVE-2025-42922 (CVSS 9.9/10), and CVE-2025-42958 (CVSS 9.1/10), in its NetWeaver product that could lead to remote code execution and arbitrary file upload if exploited. This comes days after CVE-2025-42957 (CVSS 9.9/10) from last month’s patch cycle was confirmed to be exploited in the wild. If those patches have not been applied yet, it is highly recommended to do so.

Affected Versions

  • A full list of affected versions can be found here.

Recommendations

  • Apply the latest patches.

More Reading / Information

Veeam Patches Three Vulnerabilities in Backup & Replication

Veeam has released patches for three vulnerabilities in its Backup and Replication product that could expose organizations to remote code execution and privilege escalation. The first critical severity, CVE-2025-48983 (CVSS 9.9/10), stems from an insufficient input validation in the Mount service. The second critical, CVE-2025-48984 (CVSS 9.9/10), permits remote code execution on the backup server by an authenticated domain user.

Affected Versions

  • Veeam Backup & Replication v12 and earlier.

Recommendations

  • Apply the 12.3.2.4165 patch to Veeam Backup and Replication v12.

More Reading / Information

High-Severity Vulnerabilities Patched by Fortinet

Fortinet has released patches for 30 vulnerabilities as part of its October Patch Tuesday updates. Several of the vulnerabilities have been assigned a high severity rating, including CVE-2025-54988. This vulnerability is due to FortiDLP’s use of Apache Tika, which is vulnerable to a sensitive data read vulnerability. The remaining patches address issues that can be exploited for arbitrary code execution, causing a DoS condition, conducting XSS attacks, privilege escalation, and more.

Of note, CyberMaxx has already taken steps to globally mitigate our equipment against these vulnerabilities.

Affected Versions

  • For a full list of affected products and versions, click here.

Recommendations

  • Please apply the latest patches.

More Reading / Information

Microsoft’s October Patch Tuesday Release

Microsoft has released its Patch Tuesday for October. This includes security updates for 172 vulnerabilities. This also includes six zero-day vulnerabilities and eight critical vulnerabilities, five of which are remote code execution, and three are elevation of privilege vulnerabilities.

The two Windows zero-days that have come under active exploitation are as follows:

  • CVE-2025-24990 (CVSS score: 7.8/10) – Windows Agere Modem Driver (“ltmdm64.sys”) Elevation of Privilege Vulnerability
  • CVE-2025-59230 (CVSS score: 7.8/10) – Windows Remote Access Connection Manager (RasMan) Elevation of Privilege Vulnerability

Affected Versions

  • A full list of affected versions can be found here.

Recommendations

  • Apply the latest patches.

More Reading / Information

https://thehackernews.com/2025/10/two-new-windows-zero-days-exploited-in.html

Juniper Networks October Patch Release

Juniper Networks has released patches for over 200 vulnerabilities in Junos Space and Junos Space Security Director. The most severe is CVE-2025-59978 (CVSS 9/10), a cross-site scripting vulnerability that could allow an attacker to store script tags and execute commands with admin privileges. Juniper stated that they are not aware of any vulnerabilities being exploited in the wild.

Affected Versions

A full list of affected versions can be found here.

Recommendations

Apply the latest patches.

More Reading / Information

Security Updates for Adobe

Adobe released patches for 60 vulnerabilities, affecting its Adobe Connect, Commerce, Magento, and more products. Successful exploitation of these issues could lead to code execution, privilege escalation, bypass of security features, and arbitrary read access to the file system.

Affected Versions

A full list of affected versions can be found here.

Recommendations

Apply the latest patches.

More Reading / Information

Recommendations

Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to “vendor-supported versions” only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, CyberMaxx strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.