PatchSiren cyber security CVE debrief
CVE-2025-38728 Cert Portal CVE debrief
CVE-2025-38728 is a Linux kernel SMB3/ksmbd memory-safety flaw that can trigger a slab out-of-bounds read during mount operations. In the supplied Siemens/CISA advisory, the affected product mapping is Siemens SIMATIC CN 4100 versions before 5.0, with remediation to update to V5.0 or later. The advisory rates the issue as CVSS 5.5/Medium and frames the impact as availability-focused rather than confidentiality or integrity compromise.
- Vendor
- Cert Portal
- Product
- Siemens SIMATIC CN 4100 vers:intdot/<5.0
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-12
- Original CVE updated
- 2026-05-14
- Advisory published
- 2026-05-12
- Advisory updated
- 2026-05-14
Who should care
Operators and administrators responsible for Siemens SIMATIC CN 4100 deployments, especially systems that rely on SMB3/CIFS mount paths and ksmbd-related kernel code. Linux platform teams that build, ship, or maintain affected kernels should also review their update posture, even if the immediate advisory is framed for an OT product.
Technical summary
The advisory describes a missing bounds check in parse_server_interfaces() in the Linux kernel cifs/SMB3 code path. With KASAN enabled, a mount to ksmbd can reach a slab out-of-bounds read in parse_server_interfaces(), which in the supplied report occurs during SMB3_request_interfaces() and the mount flow. The reported CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating a local, low-privilege condition with high availability impact.
Defensive priority
Medium
Recommended defensive actions
- Update affected Siemens SIMATIC CN 4100 systems to V5.0 or later, per the vendor remediation guidance.
- Validate whether your environment uses SMB3/CIFS mount paths or ksmbd-related functionality that could exercise the affected code path.
- Prioritize patching in maintenance windows for exposed OT assets, since the advisory indicates availability impact.
- Review asset inventories and confirm which deployed versions fall below the fixed release threshold.
- Monitor Siemens and CISA advisory updates for any revision history or follow-on guidance.
Evidence notes
The supplied source corpus is a CISA CSAF advisory republising Siemens ProductCERT SSA-032379 for CVE-2025-38728, published 2026-05-12 and republished 2026-05-14. The corpus states the issue is a Linux kernel smb3 fix for a slab out-of-bounds condition in parse_server_interfaces(), and the remediation is to update to V5.0 or later. The enrichment marks the issue as not known to be in CISA KEV.
Official resources
-
CVE-2025-38728 CVE record
CVE.org
-
CVE-2025-38728 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Public advisory disclosure date in the supplied corpus is 2026-05-12, with a CISA republication on 2026-05-14. The issue is publicly documented in the Siemens/CISA advisory materials referenced here.