PatchSiren cyber security CVE debrief
CVE-2025-0836 Siemens CVE debrief
CVE-2025-0836 is a medium-severity authorization flaw published on 2026-02-10 and republished by CISA on 2026-02-12. The advisory says users with read-only access to the Management Server may gain full read/write access to the MIP Webhooks API, so organizations should treat Management Server role settings as security-sensitive until patched.
- Vendor
- Siemens
- Product
- Siveillance Video V2022 R3
- CVSS
- MEDIUM 6.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-02-10
- Original CVE updated
- 2026-02-12
- Advisory published
- 2026-02-10
- Advisory updated
- 2026-02-12
Who should care
Administrators and security teams responsible for Siemens Siveillance Video Management Servers, especially environments running the affected releases listed in the advisory. OT/physical-security operations teams should also review access controls for management-plane accounts that have read-only roles but may be able to modify webhook configuration.
Technical summary
The source advisory describes a missing authorization issue (CWE-862) with CVSS 3.1 vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L (6.3, Medium). In practical terms, an authenticated user with read-only access to the Management Server can be able to interact with the MIP Webhooks API as if they had read/write access. The advisory lists vendor fixes for Siveillance Video V2022 R3, V2023 R1, V2023 R2, V2023 R3, V2024 R1, and V2025, and recommends auditing role security settings if patching is not immediately possible.
Defensive priority
Prioritize patching before relying on compensating controls, because the issue affects management-plane authorization and can turn read-only access into write capability. If immediate patching is not possible, review every read-only Management Server role and assume those users may have effective write access to Webhooks configuration until proven otherwise.
Recommended defensive actions
- Update to the vendor-fixed release for your product line: V23.1 HotfixRev18, V23.2 HotfixRev18, V23.3 HotfixRev23, V24.1 HotfixRev14, or V25.1 HotfixRev8, as applicable.
- Audit Management Server role assignments and verify that read-only users cannot modify MIP Webhooks configuration.
- Restrict access to management interfaces to trusted administrative networks and accounts only.
- Review webhook-related configuration and logs for unexpected changes or access by accounts that should be read-only.
- If patching is delayed, treat read-only access to the Management Server as effectively privileged for Webhooks configuration until remediation is complete.
Evidence notes
Primary evidence comes from the CISA CSAF republication of Siemens ProductCERT advisory SSA-625934 (ICSA-26-043-07), which states the missing authorization condition and the remediation guidance. The source corpus also lists the CVSS vector 3.1 score of 6.3 and the affected Siveillance Video product versions. Note: the advisory description mentions Milestone Systems XProtect VMS and MIP Webhooks API, while the CSAF product tree and remediation entries are for Siemens Siveillance Video; this wording inconsistency is present in the supplied source corpus and is not resolved here. No exploit code or weaponized reproduction details are included.
Official resources
-
CVE-2025-0836 CVE record
CVE.org
-
CVE-2025-0836 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CVE-2025-0836 was published on 2026-02-10 and modified on 2026-02-12. It is not listed as a CISA Known Exploited Vulnerability in the supplied corpus.