PatchSiren cyber security CVE debrief
CVE-2025-21762 Siemens CVE debrief
CVE-2025-21762 is a Linux kernel availability vulnerability that Siemens mapped to SIMATIC S7-1500 TM MFP - BIOS in its industrial advisory. The kernel issue is described as a missing RCU-protection problem in arp_xmit(), which could create a potential use-after-free condition when the function is called without RTNL or RCU protection. For defenders, the main concern is service disruption rather than data exposure: the supplied CVSS vector shows local access, low privileges, no user interaction, and high availability impact only. Siemens’ advisory notes that no fix was available at publication time and advises only using trusted sources for building and running applications while following industrial cybersecurity best practices.
- Vendor
- Siemens
- Product
- SIMATIC S7-1500 TM MFP - BIOS
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-03-11
- Original CVE updated
- 2025-09-09
- Advisory published
- 2025-03-11
- Advisory updated
- 2025-09-09
Who should care
Siemens SIMATIC S7-1500 TM MFP operators, OT/ICS engineers, system administrators, and security teams responsible for Linux-based industrial platforms that include the affected Siemens product.
Technical summary
The advisory states that arp_xmit() can be invoked without RTNL or RCU protection. The resolution is to add RCU protection to avoid a potential use-after-free. Based on the supplied CVSS vector (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H), the practical risk is local exploitation leading to availability impact.
Defensive priority
Medium
Recommended defensive actions
- Track Siemens advisory SSA-503939 and the CISA ICS advisory for updates, since the supplied source says no fix was available at publication time.
- Apply Siemens guidance to only build and run applications from trusted sources.
- Follow CISA ICS recommended practices and defense-in-depth guidance for industrial control systems.
- Review whether the affected Siemens SIMATIC S7-1500 TM MFP - BIOS product is deployed in your environment and document compensating controls until a vendor fix is available.
- Limit local access and privileged use on affected systems to reduce exposure to the local/low-privilege attack conditions indicated by the CVSS vector.
Evidence notes
The source corpus links CVE-2025-21762 to CISA advisory ICSA-25-072-03 and Siemens advisory SSA-503939. The advisory description explicitly says the Linux kernel vulnerability is resolved by using RCU protection in arp_xmit() to avoid a potential UAF. The remediations section states that no fix was available at publication time and provides a trusted-sources-only workaround. The supplied CVSS vector indicates local, low-privilege, no-interaction conditions with availability impact only.
Official resources
-
CVE-2025-21762 CVE record
CVE.org
-
CVE-2025-21762 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in the supplied CISA CSAF source on 2025-03-11; the source record was modified on 2025-09-09.