PatchSiren cyber security CVE debrief
CVE-2025-38222 Siemens CVE debrief
CVE-2025-38222 is an integer-overflow defect in the Linux kernel ext4 inline_data write path that can lead to a kernel BUG/Oops when a write with a very large offset is processed. The supplied Siemens/CISA advisory corpus associates this CVE with SIMATIC S7-1500 CPU family products and states that no fix is currently available, so the practical response is to reduce local access to the embedded GNU/Linux subsystem and apply the listed mitigations. The supplied CVSS vector rates this as a Medium availability issue (5.5) with no confidentiality or integrity impact.
- Vendor
- Siemens
- Product
- SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-06-10
- Original CVE updated
- 2026-05-14
- Advisory published
- 2025-06-10
- Advisory updated
- 2026-05-14
Who should care
Siemens SIMATIC S7-1500 operators, OT/ICS asset owners, Linux subsystem administrators on affected devices, and vulnerability/patch management teams responsible for industrial control environments.
Technical summary
The CVE description says ext4_prepare_inline_data used an unsigned int length, so pos + len could truncate during ext4_generic_write_inline_data. That can let write_begin succeed with an incorrect small length, and write_end later reaches BUG_ON(pos + len > EXT4_I(inode)->i_inline_size) in ext4_write_inline_data, causing a kernel BUG/Oops. The described fix is to use loff_t for the len parameter. In the supplied advisory corpus, Siemens ties the issue to the SIMATIC S7-1500 CPU family and its additional GNU/Linux subsystem, but the corpus does not provide a fixed version.
Defensive priority
Medium, with elevated operational priority in OT environments because the advisory lists no fix and the impact is a kernel crash/availability loss.
Recommended defensive actions
- Restrict interactive shell access on the additional GNU/Linux subsystem to trusted personnel only.
- Only build and run applications from trusted sources.
- Track Siemens ProductCERT and CISA advisories for a future fixed release and deploy it when available.
- Apply CISA/Siemens defense-in-depth guidance for the affected SIMATIC S7-1500 environment.
- Review whether local users or automation can reach the embedded Linux write path, and limit that access where possible.
Evidence notes
Source item ICSA-25-162-05 (published 2025-06-10, last updated 2026-05-14) contains the CVE description, affected Siemens SIMATIC S7-1500 product names, and mitigation text stating no fix is currently available. The CVE record links to the Linux ext4 inline_data overflow description and a CVSS 3.1 vector of AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The advisory corpus also includes Siemens CSAF/HTML references and CISA advisory links.
Official resources
-
CVE-2025-38222 CVE record
CVE.org
-
CVE-2025-38222 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Published in the supplied advisory corpus on 2025-06-10 and last modified on 2026-05-14. Not listed in CISA KEV in the provided enrichment.