PatchSiren cyber security CVE debrief
CVE-2022-39188 Siemens CVE debrief
CVE-2022-39188 describes a Linux kernel race condition that can let a device driver free a page while stale TLB entries still exist. In the Siemens advisory published by CISA on 2025-02-11, the issue is tied to multiple SCALANCE W700 product variants and the recommended remediation is to update to V3.0.0 or later. The published CVSS score is 4.7 (MEDIUM), with impact concentrated on availability.
- Vendor
- Siemens
- Product
- SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)
- CVSS
- MEDIUM 4.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-02-11
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-02-11
- Advisory updated
- 2025-05-06
Who should care
Operators and maintainers of the listed Siemens SCALANCE WAB/WAM/WUB/WUM devices, OT/ICS administrators responsible for patch planning, and security teams that track Linux-kernel-derived issues in embedded networking equipment.
Technical summary
The vulnerability is described as a race between unmap_mapping_range and munmap in include/asm-generic/tlb.h in Linux kernels before 5.19. Under the specific condition of VM_PFNMAP VMAs, a device driver can free a page while stale TLB entries remain, creating an availability-impacting memory-management flaw. The Siemens advisory maps this upstream Linux issue to 19 affected SCALANCE product identifiers and provides a vendor remediation path to V3.0.0 or later.
Defensive priority
Medium — plan a timely maintenance update to the vendor-fixed version, verify affected product coverage, and validate service behavior after patching.
Recommended defensive actions
- Identify whether any of the 19 Siemens SCALANCE product variants listed in the advisory are in your environment.
- Check the installed vendor/software version against Siemens remediation guidance and plan an upgrade to V3.0.0 or later.
- Schedule the update through normal OT maintenance/change-control processes and confirm operational compatibility after installation.
- Use CISA and Siemens advisory references to confirm the exact affected product IDs before deploying the fix.
- Apply ICS defense-in-depth practices around segmentation, access control, and monitoring as part of the update plan.
Evidence notes
This debrief is based on the CISA CSAF advisory ICSA-25-044-09, the Siemens advisory references, and the CVE/NVD record links supplied in the source corpus. The CVE description and CVSS vector indicate a local, low-privilege, no-user-interaction issue with high availability impact and no stated confidentiality or integrity impact. The source corpus also provides a vendor fix statement: update to V3.0.0 or later. No KEV entry was supplied.
Official resources
-
CVE-2022-39188 CVE record
CVE.org
-
CVE-2022-39188 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in CISA advisory ICSA-25-044-09 on 2025-02-11, with a later advisory revision on 2025-05-06 that fixed typos. No Known Exploited Vulnerabilities entry was supplied in the source corpus.