PatchSiren cyber security CVE debrief
CVE-2025-39742 Cert Portal CVE debrief
CVE-2025-39742 describes a Linux kernel RDMA issue in hfi1 where find_hw_thread_mask() could divide the number of online CPUs by num_core_siblings before verifying that the divisor is nonzero. That ordering creates a possible divide-by-zero runtime error and an availability impact consistent with the published CVSS 5.5 (MEDIUM) rating. The vendor guidance in the advisory is to update to V5.0 or later. The advisory was published by CISA on 2026-05-12 and republished on 2026-05-14 from Siemens ProductCERT material. Because the source metadata also lists Siemens SIMATIC CN 4100 and a low-confidence vendor mapping, this record should be read with caution: the technical defect text is clearly Linux-kernel based, while the product mapping in the advisory needs review.
- Vendor
- Cert Portal
- Product
- Siemens SIMATIC CN 4100 vers:intdot/<5.0
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-12
- Original CVE updated
- 2026-05-14
- Advisory published
- 2026-05-12
- Advisory updated
- 2026-05-14
Who should care
Operators of systems covered by the Siemens/CISA advisory, especially environments using Siemens SIMATIC CN 4100 as identified in the source material, and teams responsible for Linux kernel maintenance, RDMA-enabled systems, and availability-sensitive infrastructure.
Technical summary
The flaw is a classic divide-by-zero condition (CWE-369). In find_hw_thread_mask(), the code divides by num_core_siblings and only later checks whether that value is zero. The fix moves the zero check ahead of the division, preventing a runtime fault and removing an unnecessary indentation level. The published CVSS vector (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) indicates local access, low privileges, no user interaction, and high availability impact.
Defensive priority
Medium
Recommended defensive actions
- Apply the vendor remediation: update to V5.0 or later, as directed in the advisory.
- Review systems that include the affected Linux kernel RDMA hfi1 path and confirm whether the advisory applies to your deployment.
- Prioritize patching on availability-sensitive hosts first, since the impact is denial of service rather than confidentiality or integrity loss.
- Verify asset inventories against the Siemens advisory references before treating the product mapping as authoritative, because the source metadata is marked low confidence and needs review.
- Track the CISA advisory and Siemens ProductCERT references for any revision updates or clarification.
Evidence notes
Primary evidence comes from the CISA CSAF source item for ICSA-26-134-10 and the embedded advisory description, which explicitly states that find_hw_thread_mask() divided by num_core_siblings before checking it for zero. The source also lists the remediation as updating to V5.0 or later. The official CVSS vector and CWE-369 reference support the availability-focused, divide-by-zero characterization. The advisory metadata contains a low-confidence product mapping (Siemens SIMATIC CN 4100) that should be treated cautiously.
Official resources
-
CVE-2025-39742 CVE record
CVE.org
-
CVE-2025-39742 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA on 2026-05-12 in ICSA-26-134-10, with a CISA republication update on 2026-05-14 sourced from Siemens ProductCERT SSA-032379.