PatchSiren cyber security CVE debrief
CVE-2025-3360 Siemens CVE debrief
CVE-2025-3360 is a GLib parsing flaw triggered by a long invalid ISO 8601 timestamp passed to g_date_time_new_from_iso8601(). In the Siemens advisory trail republished by CISA, the issue is tied to affected SINEC OS firmware and mitigated by updating to V3.3 or later. The published CVSS rating is low (3.7), with impact limited to availability.
- Vendor
- Siemens
- Product
- RUGGEDCOM RST2428P (6GK6242-6PA00)
- CVSS
- LOW 3.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-01-28
- Original CVE updated
- 2026-02-25
- Advisory published
- 2026-01-28
- Advisory updated
- 2026-02-25
Who should care
Operators and maintainers of Siemens industrial networking devices running affected SINEC OS firmware should review their exposure, especially the RUGGEDCOM RST2428P and the listed SCALANCE families in the advisory metadata.
Technical summary
The defect is described as an integer overflow and buffer under-read in GLib during parsing of a long invalid ISO 8601 timestamp. The CVSS vector (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) indicates a network-reachable condition that is difficult to trigger and affects availability rather than confidentiality or integrity. Siemens' remediation is to update affected products to V3.3 or later.
Defensive priority
Medium-low. The score is low, but the flaw affects industrial equipment and can still cause service disruption, so it should be addressed during normal maintenance cycles or sooner on exposed or operationally sensitive devices.
Recommended defensive actions
- Identify Siemens devices in scope and verify whether they run affected SINEC OS firmware.
- Plan and apply the Siemens-recommended update to V3.3 or later using the product-specific guidance in advisory 109997626.
- Use a maintenance window and test the firmware update path before deployment in OT environments.
- Follow CISA ICS recommended practices to reduce exposure and limit operational impact while patching is scheduled.
Evidence notes
The source item and CVE record are dated 2026-01-28, with a latest modification on 2026-02-25. CISA's revision history shows republication updates on 2026-02-12 and 2026-02-24/25, including a clarification that only SINEC OS firmware is impacted. The remediation guidance in the Siemens advisory points to V3.3 or later for affected products.
Official resources
-
CVE-2025-3360 CVE record
CVE.org
-
CVE-2025-3360 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in the CISA/Siemens advisory record on 2026-01-28, with subsequent republications and clarification updates through 2026-02-25.