PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-11840 Siemens CVE debrief

CVE-2025-11840 is a locally exploitable out-of-bounds read condition tied to vfinfo in ldmisc.c from GNU Binutils 2.45, as described in the advisory corpus. Siemens’ CSAF advisory maps the issue to five SIMATIC S7-1500 CPU family products and states that the attack can only be executed locally, with public exploit availability noted in the CVE description. The advisory set was first published on 2025-06-10 and later republishe

Vendor
Siemens
Product
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
CVSS
LOW 3.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-06-10
Original CVE updated
2026-05-14
Advisory published
2025-06-10
Advisory updated
2026-05-14

Who should care

Organizations operating the affected Siemens SIMATIC S7-1500 CPU family products, especially environments where the additional GNU/Linux subsystem or interactive shell is available. Asset owners, OT/ICS administrators, and maintenance teams should review exposure even though the issue is locally exploitable and rated LOW, because public exploit availability increases risk for trusted-user or adjacent-system abuse.

Technical summary

The supplied source corpus identifies an out-of-bounds read in the vfinfo function within ldmisc.c, associated with GNU Binutils 2.45. The CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L, indicating a local attack requiring limited privileges and causing limited availability impact. Siemens’ advisory context links the issue to the SIMATIC S7-1500 CPU 1518-4/1518F-4 PN/DP MFP variants and the SIPLUS variant, and the remediation text emphasizes restricting shell access and only running trusted applications. The same source set also notes that no fix is currently available for the listed products, despite the CVE description referring to patch 16357.

Defensive priority

Medium for affected Siemens OT assets with local shell or trusted-user access; lower for environments where the GNU/Linux subsystem is not exposed. Priority should increase if untrusted operators, contractors, or shared administrative access exist, or if the affected CPUs are reachable by users who could execute local code.

Recommended defensive actions

  • Limit access to the interactive shell of the additional GNU/Linux subsystem to trusted personnel only.
  • Only build and run applications from trusted sources.
  • Review which of the five affected Siemens CPU variants are deployed in your environment and confirm whether the GNU/Linux subsystem is enabled or reachable.
  • Apply vendor guidance from Siemens/CISA advisories as soon as a fix or updated mitigation becomes available.
  • Monitor for unusual local activity on affected engineering or runtime systems, especially where privileged user access is shared.

Evidence notes

The core vulnerability description comes from the supplied CVE text: a weakness in GNU Binutils 2.45, specifically vfinfo in ldmisc.c, resulting in an out-of-bounds read and requiring local execution. The Siemens CSAF source maps CVE-2025-11840 to five SIMATIC S7-1500 CPU family products and includes mitigation-only guidance, including restricting shell access and trusting application sources. The source corpus also states that no fix is currently available for the listed products, while the CVE description mentions patch 16357; this debrief preserves both statements without asserting an unverified deployment path for the patch.

Official resources

Publicly disclosed on 2025-06-10. The source corpus notes public exploit availability and a later advisory update on 2026-05-14. This debrief uses the CVE publication date for timing context and does not treat later processing or republic