PatchSiren cyber security CVE debrief
CVE-2024-41049 Siemens CVE debrief
CVE-2024-41049 is a Linux kernel use-after-free in filelock/posix_lock_inode. In Siemens advisory ICSA-25-072-03 for SIMATIC S7-1500 TM MFP - BIOS, the issue is described as a race in which a lock entry can be freed before the tracepoint fires; the documented fix is to move the tracepoint inside the spinlock. At publication, Siemens listed no fix and only a trusted-source workaround.
- Vendor
- Siemens
- Product
- SIMATIC S7-1500 TM MFP - BIOS
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-03-11
- Original CVE updated
- 2025-09-09
- Advisory published
- 2025-03-11
- Advisory updated
- 2025-09-09
Who should care
Operators and maintainers of Siemens SIMATIC S7-1500 TM MFP - BIOS systems, OT/embedded Linux administrators, and security teams responsible for controlling local code execution on affected devices.
Technical summary
The supplied source describes a Linux kernel bug in posix_lock_inode where a request pointer is changed to reference a lock entry on the inode list, but another task can race in and free that lock before trace_posix_lock_inode() runs, triggering a KASAN UAF warning. Siemens’ advisory ties this CVE to SIMATIC S7-1500 TM MFP - BIOS and gives CVSS 3.1 vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (7.8 High). The stated remediation is to move the tracepoint inside the spinlock, and the advisory notes that no fix was available at publication.
Defensive priority
High
Recommended defensive actions
- Review the Siemens CSAF advisory and associated product guidance for SIMATIC S7-1500 TM MFP - BIOS.
- Apply the vendor-documented workaround: only build and run applications from trusted sources.
- Limit local access and reduce opportunities for untrusted code execution on affected systems.
- Track Siemens and upstream Linux kernel advisories for a vendor fix and deploy it promptly when available.
- Follow CISA ICS recommended practices and defense-in-depth guidance for OT environments.
Evidence notes
Primary evidence comes from the CISA CSAF source item (ICSA-25-072-03), published 2025-03-11 and modified 2025-09-09, which includes the Linux kernel UAF description, the Siemens product association, the CVSS vector, and the remediation status. Siemens’ linked CSAF/HTML advisory references the same issue and the same remediation language. The later 2025-09-09 modification in the source history should not be treated as the CVE issue date; the disclosure date is 2025-03-11.
Official resources
-
CVE-2024-41049 CVE record
CVE.org
-
CVE-2024-41049 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed on 2025-03-11. The source advisory was modified on 2025-09-09 to add a different CVE, but CVE-2024-41049’s disclosure date remains 2025-03-11.