PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-7104 Siemens CVE debrief

CISA’s ICS advisory ICSA-25-100-02, based on Siemens ProductCERT advisory SSA-277137, maps CVE-2023-7104 to Siemens SIDIS Prime. The advisory describes a heap-based buffer overflow in SQLite’s sessionReadRecord path (ext/session/sqlite3session.c) and recommends updating SIDIS Prime to V4.0.700 or later. The source advisory was published on 2025-04-08 and revised on 2025-05-06 for typo fixes.

Vendor
Siemens
Product
SIDIS Prime
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-08
Original CVE updated
2025-05-06
Advisory published
2025-04-08
Advisory updated
2025-05-06

Who should care

Siemens SIDIS Prime operators, industrial-control-system administrators, integrators, and defenders responsible for environments that include the affected SIDIS Prime release line or embedded SQLite session components.

Technical summary

The supplied advisory metadata identifies a heap-based buffer overflow affecting SQLite3 up to 3.43.0 in the sessionReadRecord function within ext/session/sqlite3session.c. In the Siemens CSAF context, the affected product is SIDIS Prime, and the documented remediation is to update to V4.0.700 or later. The advisory’s CVSS vector is AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L, which corresponds to a medium-severity exposure in the supplied data.

Defensive priority

Medium overall; prioritize quickly if SIDIS Prime is deployed in reachable or operationally sensitive ICS environments because a vendor patch is available.

Recommended defensive actions

  • Update Siemens SIDIS Prime to V4.0.700 or later, per the advisory remediation.
  • Inventory SIDIS Prime deployments and confirm whether the affected release line is present.
  • Verify patch application and document the maintenance window and rollback plan.
  • Apply standard ICS hardening and segmentation guidance from CISA recommended practices around affected systems.
  • Monitor Siemens and CISA advisory pages for any follow-up revisions or additional mitigation guidance.

Evidence notes

All core claims here come from the supplied CISA CSAF source item and its referenced Siemens advisory metadata: the affected product is Siemens SIDIS Prime; the issue description is a heap-based buffer overflow in SQLite sessionReadRecord; and the remediation is V4.0.700 or later. The advisory timeline in the corpus shows publication on 2025-04-08 and a typo-fix revision on 2025-05-06. No KEV entry is present in the supplied enrichment data.

Official resources

CISA published the advisory on 2025-04-08 and revised it on 2025-05-06 for typo corrections. Those dates reflect advisory publication and revision timing, not the original vulnerability discovery date. The advisory context attributes CVE-