PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-21762 Siemens CVE debrief

CVE-2025-21762 is a Linux kernel availability vulnerability that Siemens mapped to SIMATIC S7-1500 TM MFP - BIOS in its industrial advisory. The kernel issue is described as a missing RCU-protection problem in arp_xmit(), which could create a potential use-after-free condition when the function is called without RTNL or RCU protection. For defenders, the main concern is service disruption rather than data exposure: the supplied CVSS vector shows local access, low privileges, no user interaction, and high availability impact only. Siemens’ advisory notes that no fix was available at publication time and advises only using trusted sources for building and running applications while following industrial cybersecurity best practices.

Vendor
Siemens
Product
SIMATIC S7-1500 TM MFP - BIOS
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-03-11
Original CVE updated
2025-09-09
Advisory published
2025-03-11
Advisory updated
2025-09-09

Who should care

Siemens SIMATIC S7-1500 TM MFP operators, OT/ICS engineers, system administrators, and security teams responsible for Linux-based industrial platforms that include the affected Siemens product.

Technical summary

The advisory states that arp_xmit() can be invoked without RTNL or RCU protection. The resolution is to add RCU protection to avoid a potential use-after-free. Based on the supplied CVSS vector (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H), the practical risk is local exploitation leading to availability impact.

Defensive priority

Medium

Recommended defensive actions

  • Track Siemens advisory SSA-503939 and the CISA ICS advisory for updates, since the supplied source says no fix was available at publication time.
  • Apply Siemens guidance to only build and run applications from trusted sources.
  • Follow CISA ICS recommended practices and defense-in-depth guidance for industrial control systems.
  • Review whether the affected Siemens SIMATIC S7-1500 TM MFP - BIOS product is deployed in your environment and document compensating controls until a vendor fix is available.
  • Limit local access and privileged use on affected systems to reduce exposure to the local/low-privilege attack conditions indicated by the CVSS vector.

Evidence notes

The source corpus links CVE-2025-21762 to CISA advisory ICSA-25-072-03 and Siemens advisory SSA-503939. The advisory description explicitly says the Linux kernel vulnerability is resolved by using RCU protection in arp_xmit() to avoid a potential UAF. The remediations section states that no fix was available at publication time and provides a trusted-sources-only workaround. The supplied CVSS vector indicates local, low-privilege, no-interaction conditions with availability impact only.

Official resources

Publicly disclosed in the supplied CISA CSAF source on 2025-03-11; the source record was modified on 2025-09-09.