PatchSiren cyber security CVE debrief
CVE-2025-0665 Siemens CVE debrief
CVE-2025-0665 is a Siemens advisory item tied to a libcurl file-descriptor handling flaw in SINEC OS firmware and related Siemens industrial networking products. The issue can cause the same eventfd file descriptor to be closed twice during connection teardown after threaded name resolution. Siemens provides a fix in V3.3 or later, and CISA republished the advisory with later scope clarifications. Given the CVSS 7.3 network-reachable profile and low confidentiality/integrity/availability impact, this is a high-priority patch item for operational environments running affected firmware.
- Vendor
- Siemens
- Product
- RUGGEDCOM RST2428P (6GK6242-6PA00)
- CVSS
- HIGH 7.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-01-28
- Original CVE updated
- 2026-02-25
- Advisory published
- 2026-01-28
- Advisory updated
- 2026-02-25
Who should care
Siemens OT/ICS administrators, industrial network engineers, asset owners of affected RUGGEDCOM and SCALANCE devices, and security teams responsible for firmware lifecycle management.
Technical summary
The source advisory describes a libcurl bug where a connection channel teardown can wrongly close the same eventfd file descriptor twice after a threaded name resolve completes. CISA’s CSAF record ties the issue to Siemens SINEC OS firmware and lists multiple affected Siemens product families. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, indicating a network-reachable issue with limited but real impact.
Defensive priority
High
Recommended defensive actions
- Update affected Siemens devices to V3.3 or later, per Siemens remediation guidance.
- Confirm which deployed models and firmware revisions are actually in scope, since CISA later clarified and expanded the affected-product listing.
- Prioritize patching of exposed or operationally critical assets during planned maintenance windows.
- After remediation, verify firmware version and validate normal service behavior on each updated device.
- Apply industrial-control-system network segmentation and minimize management-plane exposure, following CISA ICS recommended practices.
- Monitor Siemens and CISA advisories for any additional scope or remediation updates.
Evidence notes
The source corpus consistently describes the flaw as libcurl incorrectly closing the same eventfd file descriptor twice after threaded name resolution. Siemens remediation guidance in the advisory points to updating to V3.3 or later. The CISA CSAF revision history shows publication on 2026-01-28, a 2026-02-24 scope clarification, and a 2026-02-25 republication update based on Siemens ProductCERT advisory SSA-089022.
Official resources
-
CVE-2025-0665 CVE record
CVE.org
-
CVE-2025-0665 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Published 2026-01-28 and updated 2026-02-25. CISA revision history shows an initial publication, a 2026-02-24 scope clarification, and a 2026-02-25 republication update.