PatchSiren cyber security CVE debrief
CVE-2025-3198 Siemens CVE debrief
CVE-2025-3198 is a low-severity, locally exploitable memory leak described in GNU Binutils 2.43/2.44, specifically in objdump's display_info path. In Siemens' advisory context, it is associated with several SIMATIC S7-1500 CPU variants, and the source states that no fix is currently available for the affected products. Because the issue requires local access and the source notes publicly disclosed exploitation, the main defensive need is to reduce who can access the affected GNU/Linux subsystem and to follow Siemens/CISA updates for remediation.
- Vendor
- Siemens
- Product
- SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
- CVSS
- LOW 3.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-06-10
- Original CVE updated
- 2026-05-14
- Advisory published
- 2025-06-10
- Advisory updated
- 2026-05-14
Who should care
Operators and administrators of the affected Siemens SIMATIC S7-1500 CPU 1518/1518F MFP variants, especially environments that expose the additional GNU/Linux subsystem or allow local shell access.
Technical summary
The source corpus describes a memory leak in GNU Binutils' objdump component, in binutils/bucomm.c within the display_info function. Siemens' CSAF advisory maps CVE-2025-3198 to five SIMATIC/SIPLUS S7-1500 CPU product variants. The supplied CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L, which aligns with a local issue that has limited availability impact and no confidentiality or integrity impact in the provided scoring. The advisory notes public exploit disclosure and, for the affected Siemens products, lists no currently available fix.
Defensive priority
Low
Recommended defensive actions
- Limit access to the interactive shell of the additional GNU/Linux subsystem to trusted personnel only.
- Only build and run applications from trusted sources.
- Monitor Siemens ProductCERT and CISA advisory updates for a vendor fix or updated guidance.
- Review local account access on affected systems and remove unnecessary interactive access.
- Treat the issue as a local hardening concern rather than a remote exposure, but still prioritize remediation in environments where untrusted local access is possible.
Evidence notes
This debrief is grounded in the supplied CISA CSAF source item ICSA-25-162-05 and its linked Siemens advisory references. The source publication date is 2025-06-10 and the latest supplied modification date is 2026-05-14; those dates are used only as advisory timing context. The source text explicitly states: GNU Binutils 2.43/2.44, objdump/binutils/bucomm.c display_info, memory leak, local attack path, public exploit disclosure, and 'currently no fix is available' for the affected Siemens products.
Official resources
-
CVE-2025-3198 CVE record
CVE.org
-
CVE-2025-3198 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
The supplied source states that the exploit has been disclosed to the public and may be used. The CVE was published on 2025-06-10 and last modified in the supplied data on 2026-05-14.