PatchSiren cyber security CVE debrief
CVE-2025-39685 Cert Portal CVE debrief
CVE-2025-39685 describes an input-validation flaw in the Linux kernel’s comedi/pcl726 path where an oversized IRQ selection can trigger an out-of-bounds condition. The source advisory was published on 2026-05-12 and republished on 2026-05-14 by CISA from Siemens ProductCERT material. The advisory recommends updating to V5.0 or later. The source corpus also contains a product-label mismatch: the vulnerability text is clearly Linux-kernel-centric, while the advisory metadata names Siemens SIMATIC CN 4100; that applicability should be reviewed before assuming exposure.
- Vendor
- Cert Portal
- Product
- Siemens SIMATIC CN 4100 vers:intdot/<5.0
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-12
- Original CVE updated
- 2026-05-14
- Advisory published
- 2026-05-12
- Advisory updated
- 2026-05-14
Who should care
Organizations operating Siemens SIMATIC CN 4100 systems covered by the advisory, and defenders responsible for Linux kernel deployments that include the affected comedi/pcl726 driver path. Because the CVSS vector is local and requires privileges, this is primarily a hardening and patch-management issue for trusted-user or device-management environments.
Technical summary
The advisory text says a reproducer passed an IRQ value of 0x80008000, which was too large and triggered an out-of-bounds condition. The discussed fix is to add interrupt-number validation so users cannot supply an IRQ number that exceeds the valid range. The source also notes a related C-language concern: shifting 1 into bit 31 with `1 << it->options[1]` is undefined behavior, so the upper bound should be constrained or an unsigned shift should be used. The CVSS vector provided by the source is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local access, low complexity, low privileges, no user interaction, and high availability impact.
Defensive priority
Medium. The issue is not network-reachable in the provided CVSS vector, but it can still cause service-impacting behavior on systems that expose the affected driver or device configuration path. Patch priority should be elevated where the advisory’s product scope applies or where local device-management interfaces are accessible to lower-privileged users.
Recommended defensive actions
- Apply the vendor-recommended update to V5.0 or later for the affected product line, per the advisory.
- Review whether any deployed systems actually include the affected comedi/pcl726 code path or the Siemens product named in the advisory metadata.
- Limit local access to device-configuration interfaces and other paths that can set IRQ-related options.
- Validate and sanitize driver- or device-level numeric inputs before they reach bit-shift or IRQ-request logic.
- Monitor for advisory updates or clarifications because the source corpus contains a Linux-kernel/product-metadata mismatch that affects scoping.
Evidence notes
Source evidence states that an oversized IRQ value (0x80008000) triggered an out-of-bounds condition and that the fix is to add an interrupt-number check. The advisory metadata lists Siemens SIMATIC CN 4100 vers:intdot/<5.0 and recommends updating to V5.0 or later. The same source corpus links to CVE.org, NVD, the CISA ICS advisory page, and Siemens ProductCERT advisory references. Published: 2026-05-12; modified/republished: 2026-05-14. Because the source text and product metadata do not fully align, product applicability should be treated as requiring confirmation.
Official resources
-
CVE-2025-39685 CVE record
CVE.org
-
CVE-2025-39685 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Public advisory source published 2026-05-12 and republished by CISA on 2026-05-14. This debrief uses only the supplied source corpus and official links.