PatchSiren cyber security CVE debrief
CVE-2025-39783 Cert Portal CVE debrief
CVE-2025-39783 is a Linux kernel PCI endpoint bug that can trigger a KASAN use-after-free warning during teardown of an endpoint function driver with a configfs attribute group. The issue comes from calling list_del() on epf_group in pci_epf_remove_cfs(), even though epf_group is a list head rather than a list entry. In the supplied advisory corpus, Siemens maps the issue to SIMATIC CN 4100 versions before 5.0 and recommends upgrading to V5.0 or later.
- Vendor
- Cert Portal
- Product
- Siemens SIMATIC CN 4100 vers:intdot/<5.0
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-12
- Original CVE updated
- 2026-05-14
- Advisory published
- 2026-05-12
- Advisory updated
- 2026-05-14
Who should care
Operators and maintainers of Siemens SIMATIC CN 4100 systems, especially those running affected versions or using PCI endpoint function drivers with configfs attribute groups. Linux kernel and embedded platform teams that integrate or unload these drivers should also review it.
Technical summary
The vulnerable path is pci_epf_remove_cfs() in the Linux kernel PCI endpoint framework. The bug is an incorrect list_del() call on struct pci_epf_driver.epf_group, which is a list head, not a list entry. When an endpoint function driver with a configfs attribute group is removed, the bad list operation can touch freed memory and produce a slab-use-after-free/KASAN report. The supplied CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (7.8 High), indicating local access and low privileges, but potentially severe confidentiality, integrity, and availability impact if the affected code path is reachable.
Defensive priority
High for affected deployments. The bug is local rather than remote, but the source advisory rates it High and provides a vendor fix. Prioritize patching if the affected kernel-derived component is present in production or field devices, especially where module teardown or configfs-based endpoint drivers are used.
Recommended defensive actions
- Upgrade to Siemens SIMATIC CN 4100 V5.0 or later, as recommended in the supplied advisory.
- Inventory devices and builds that include the affected PCI endpoint framework and configfs-based endpoint function drivers.
- Check whether any operational workflows load or unload the affected module path, since the issue is triggered during teardown.
- Use the official Siemens and CISA advisory links to confirm affected product coverage and remediation scope.
- Track whether your deployment inherits this Linux kernel code path through a vendor image or downstream firmware package.
- Treat the issue as a patching priority even if it is not remotely exploitable, because the reported impact is high and the fix is available.
Evidence notes
The supplied source item is CISA CSAF ICSA-26-134-10, republishing Siemens ProductCERT advisory SSA-032379. It describes the Linux kernel PCI endpoint teardown bug, including the incorrect list_del() on epf_group and the KASAN slab-use-after-free report. The source item also supplies CVSS 3.1 vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H and remediation to update to V5.0 or later. The enrichment shows no KEV entry, and the advisory contains no threat entries in the supplied corpus.
Official resources
-
CVE-2025-39783 CVE record
CVE.org
-
CVE-2025-39783 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CVE published on 2026-05-12 and modified on 2026-05-14; the source advisory was also published on 2026-05-12 and republished by CISA on 2026-05-14.