PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-11414 Siemens CVE debrief

CVE-2025-11414 is tied in Siemens' advisory to the SIMATIC S7-1500 CPU family and an out-of-bounds read in GNU Binutils 2.45. The issue is described as local-only, with a publicly disclosed exploit, and Siemens' advisory states no fix is currently available for the listed products. Near-term defense therefore centers on restricting shell access and using only trusted sources for applications.

Vendor
Siemens
Product
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
CVSS
LOW 3.1
CISA KEV
Not listed in stored evidence
Original CVE published
2025-06-10
Original CVE updated
2026-05-14
Advisory published
2025-06-10
Advisory updated
2026-05-14

Who should care

OT/ICS operators using the listed Siemens SIMATIC S7-1500 CPU 1518*/SIPLUS variants, especially teams that enable the additional GNU/Linux subsystem. Security and platform teams should care if local users, maintenance accounts, or third-party code can reach the affected environment.

Technical summary

The source advisory attributes the flaw to GNU Binutils 2.45, specifically get_link_hash_entry in bfd/elflink.c, resulting in an out-of-bounds read. The attack vector is local, and the supplied CVSS vector indicates low availability impact with high attack complexity and low privileges. The source notes that GNU Binutils 2.46 addresses the issue upstream, while Siemens' product advisory for the affected SIMATIC S7-1500 CPU family lists mitigations and states that no fix is currently available for those products.

Defensive priority

Low, but prioritize systems where local shell access or untrusted code execution is possible.

Recommended defensive actions

  • Restrict access to the interactive shell of the additional GNU/Linux subsystem to trusted personnel only.
  • Only build and run applications from trusted sources.
  • Track Siemens ProductCERT advisory SSA-082556 and related CISA republished updates for any future remediation changes.
  • If you maintain an upstream GNU Binutils-based toolchain, validate whether a fixed version such as 2.46 is available and applicable in your environment.

Evidence notes

CISA's CSAF advisory ICSA-25-162-05 was published on 2025-06-10 and last updated on 2026-05-14, matching the supplied CVE timing. The advisory maps CVE-2025-11414 to Siemens SIMATIC S7-1500 CPU family products and includes the vendor's mitigations. The supplied description explicitly states a GNU Binutils 2.45 out-of-bounds read in bfd/elflink.c:get_link_hash_entry, local execution only, public exploit disclosure, and that upgrading to GNU Binutils 2.46 addresses the underlying issue. Siemens' remediation section for the affected products says no fix is currently available and recommends limiting shell access and trusting application sources.

Official resources

Published by CISA on 2025-06-10 and last updated on 2026-05-14. The source description says the exploit has been publicly disclosed and may be utilized; the attack is local.