PatchSiren cyber security CVE debrief
CVE-2024-12133 Siemens CVE debrief
CVE-2024-12133 is a denial-of-service issue tied to libtasn1 certificate handling and documented by CISA in Siemens advisory ICSA-25-162-05. On the affected Siemens SIMATIC S7-1500 CPU family products, specially crafted certificate data with a large number of elements can take much longer than expected to process, which may slow the system or cause a crash. The supplied advisory notes that no fix is currently available.
- Vendor
- Siemens
- Product
- SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
- CVSS
- MEDIUM 5.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-06-10
- Original CVE updated
- 2026-05-14
- Advisory published
- 2025-06-10
- Advisory updated
- 2026-05-14
Who should care
Owners, operators, and maintainers of the affected Siemens SIMATIC S7-1500 CPU 1518/1518F MFP variants, especially OT teams responsible for certificate handling, the additional GNU/Linux subsystem, or any workflows that accept untrusted certificate data.
Technical summary
The issue is described as inefficient handling of specific certificate data in libtasn1, consistent with CWE-407 (inefficient algorithmic complexity). The advisory lists CVSS 3.1 as 5.3/Medium with AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, indicating a network-triggerable availability impact without confidentiality or integrity loss. On the affected Siemens products, a specially crafted certificate can consume excessive processing time and degrade service availability, potentially to the point of crashing the device or subsystem.
Defensive priority
Medium overall, but higher priority for exposed or certificate-processing-dependent Siemens SIMATIC S7-1500 deployments because no fix is available in the supplied advisory and mitigation is limited to exposure reduction.
Recommended defensive actions
- Restrict access to the interactive shell of the additional GNU/Linux subsystem to trusted personnel only.
- Only build and run applications from trusted sources.
- Apply CISA and Siemens industrial-control-system defense-in-depth guidance to reduce exposure to untrusted inputs.
- Review where affected devices accept or process external certificate data and minimize that exposure until a fix is available.
- Track Siemens ProductCERT and CISA updates for future remediation guidance or a patched release.
Evidence notes
This debrief is based on the supplied CISA CSAF source item for ICSA-25-162-05 and the referenced Siemens ProductCERT advisory SSA-082556. The CVE was published on 2025-06-10 and last updated on 2026-05-14 in the supplied timeline. The advisory corpus provided here indicates no fix is available and does not include a CISA KEV listing for this CVE.
Official resources
-
CVE-2024-12133 CVE record
CVE.org
-
CVE-2024-12133 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CVE-2024-12133 was published in CISA advisory ICSA-25-162-05 on 2025-06-10 and updated on 2026-05-14. The supplied advisory data does not list the CVE in CISA KEV.