PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-27769 Siemens CVE debrief

CVE-2025-27769 affects Siemens Heliox EV charging stations and is rated LOW with a 2.6 CVSS score. The issue is an improper access control weakness that could let an attacker reach unauthorized services through the charging cable.

Vendor
Siemens
Product
Heliox Flex 180 kW EV Charging Station
CVSS
LOW 2.6
CISA KEV
Not listed in stored evidence
Original CVE published
2026-03-10
Original CVE updated
2026-03-12
Advisory published
2026-03-10
Advisory updated
2026-03-12

Who should care

Operators, maintainers, and integrators responsible for Siemens Heliox Flex 180 kW EV Charging Station systems below F4.11.1 and Heliox Mobile DC 40 kW EV Charging Station systems below L4.10.1 should review this advisory. Site security teams and EV charging service providers should also prioritize it where physical access to charging equipment is possible.

Technical summary

The advisory describes an improper access control condition in affected Siemens Heliox EV charging stations. According to the supplied CVSS vector (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N), exploitation requires physical access, has low attack complexity, and can impact confidentiality at a limited level while not indicating integrity or availability impact in the base score. The reported attack path is via the charging cable, which suggests an unauthorized local interface or service exposure rather than a network-only weakness.

Defensive priority

Low to moderate. The issue is physically reachable and limited in measured impact, but it affects safety- and availability-relevant charging infrastructure and should still be remediated promptly at sites with public or semi-public access.

Recommended defensive actions

  • Contact Siemens customer support for patch information and apply the OTA update guidance provided in the advisory.
  • Inventory deployed Heliox Flex 180 kW EV Charging Station and Heliox Mobile DC 40 kW EV Charging Station assets and compare installed versions against the affected thresholds.
  • Restrict physical access to charging equipment and cable interfaces where feasible, especially at unattended sites.
  • Monitor Siemens/CISA advisory updates for any follow-on guidance or revised remediation details.
  • Validate that local operational controls and maintenance procedures limit unauthorized use of charging infrastructure.

Evidence notes

This debrief is based on the supplied CISA CSAF source item for ICSA-26-071-05 and its Siemens ProductCERT reference set. The source description states: 'Affected devices contain improper access control that could allow an attacker to reach unauthorized services via the charging cable.' The source metadata lists the affected products and version constraints, the remediation note directs customers to contact support for patch information via OTA update, and the CVSS vector is provided as CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N. Publication timing is taken from the supplied CVE and advisory dates: 2026-03-10 initial publication and 2026-03-12 republication/revision.

Official resources

First published in the supplied CISA advisory record on 2026-03-10 and revised on 2026-03-12 to incorporate Siemens ProductCERT SSA-126399 content.