PatchSiren cyber security CVE debrief
CVE-2025-7425 Cert Portal CVE debrief
CVE-2025-7425 is a high-severity memory-corruption issue in libxslt affecting Siemens SIMATIC CN 4100 versions before 5.0. Under certain XSLT processing paths, including key()-related tree fragments, the flaw can lead to improper cleanup of ID attributes, use-after-free crashes, or heap corruption.
- Vendor
- Cert Portal
- Product
- Siemens SIMATIC CN 4100 vers:intdot/<5.0
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-12
- Original CVE updated
- 2026-05-14
- Advisory published
- 2026-05-12
- Advisory updated
- 2026-05-14
Who should care
Owners and operators of Siemens SIMATIC CN 4100 systems running versions earlier than 5.0, plus ICS security and patch-management teams responsible for those environments. Teams using libxslt-backed XSLT processing in affected deployments should also review exposure.
Technical summary
The advisory describes a flaw in libxslt where attribute type, atype, and flags are modified in a way that corrupts internal memory management. When XSLT functions such as key() produce tree fragments, ID attribute cleanup can be mishandled, leaving freed memory accessible. The supplied CVSS vector (AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H) indicates local attack conditions, high complexity, no privileges or user interaction, and potential impact to integrity and availability.
Defensive priority
High. Prioritize affected Siemens SIMATIC CN 4100 systems for upgrade to V5.0 or later during the next maintenance window, with extra urgency in environments where the product is operationally critical.
Recommended defensive actions
- Upgrade Siemens SIMATIC CN 4100 to V5.0 or later, per the vendor remediation guidance.
- Confirm which deployed systems run SIMATIC CN 4100 versions earlier than 5.0 and document exposure.
- Plan and test the update in a controlled maintenance window appropriate for industrial-control environments.
- Use CISA-recommended ICS defense-in-depth practices to reduce blast radius while remediation is scheduled.
- Watch for application crashes or abnormal behavior associated with XSLT processing and libxslt usage in affected systems.
Evidence notes
Source evidence comes from the CISA CSAF advisory ICSA-26-134-10, which republishes Siemens ProductCERT SSA-032379. The supplied revision history shows initial publication on 2026-05-12 and CISA republication on 2026-05-14. The advisory text, product scope, CVSS vector, and remediation all come from the provided corpus; no KEV listing was supplied.
Official resources
-
CVE-2025-7425 CVE record
CVE.org
-
CVE-2025-7425 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Public advisory date: 2026-05-12. CISA republication date: 2026-05-14. The supplied enrichment does not list this CVE in CISA KEV.