As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
1. EXECUTIVE SUMMARY
- CVSS v4 9.3
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Siemens
- Equipment: User Management Component (UMC)
- Vulnerabilities: Stack-based Buffer Overflow, Out-of-bounds Read
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an unauthenticated remote attacker to execute arbitrary code or to cause a denial-of-service condition.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
- Siemens SIMATIC PCS neo V4.1: All versions
- Siemens SIMATIC PCS neo V5.0: All versions
- Siemens User Management Component (UMC): Versions prior to 2.15.1.3
3.2 VULNERABILITY OVERVIEW
3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121
Affected products contain a stack-based buffer overflow vulnerability in the integrated UMC component. This vulnerability could allow an unauthenticated remote attacker to execute arbitrary code or to cause a denial-of-service condition.
CVE-2025-40795 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for This article has been indexed from All CISA Advisories