PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-38499 Siemens CVE debrief

CVE-2025-38499 is a Linux kernel mount-handling vulnerability tracked in Siemens advisory ICSA-25-162-05 / SSA-082556 for SIMATIC S7-1500 CPU family products. The kernel fix description says clone_private_mnt() did not verify CAP_SYS_ADMIN in the correct user namespace, which could allow a clone to expose content hidden by a mount that should not be undoable. CISA’s CSAF record assigns a Medium CVSS 5.5 score with local, low-privilege, availability-only impact, and the advisory states that no fix is currently available.

Vendor
Siemens
Product
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-06-10
Original CVE updated
2026-05-14
Advisory published
2025-06-10
Advisory updated
2026-05-14

Who should care

Operators and maintainers of the affected Siemens SIMATIC S7-1500 CPU family, OT/ICS security teams, and Linux administrators responsible for local access, shell access, and mount-namespace behavior on these devices.

Technical summary

The issue is a missing privilege check in Linux kernel clone_private_mnt(): it checked for MNT_LOCKED-related conditions but did not always verify that the caller had CAP_SYS_ADMIN in the user namespace associated with the namespace mount. The supplied advisory text says the missing check matters because cloning should not expose something hidden by a mount that the caller would not be able to undo. The supplied CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local access, low privileges, and high availability impact only.

Defensive priority

Medium, with elevated operational attention in OT environments because the affected Siemens advisory currently lists no fix and the issue can affect availability.

Recommended defensive actions

  • Restrict access to the interactive shell of the additional GNU/Linux subsystem to trusted personnel only.
  • Only build and run applications from trusted sources.
  • Review local privilege boundaries and minimize who can perform mount-related actions on affected devices.
  • Monitor Siemens and CISA advisory updates for SSA-082556 / ICSA-25-162-05, since the supplied advisory says no fix is currently available.

Evidence notes

Evidence comes from the supplied CISA CSAF advisory for ICSA-25-162-05 and its Siemens references. The record lists five affected Siemens SIMATIC S7-1500 CPU family product variants and states that no fix is available. The CVE description specifically identifies the Linux kernel clone_private_mnt() CAP_SYS_ADMIN-in-the-right-userns gap, and the supplied CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H.

Official resources

Published 2025-06-10 in the CISA CSAF advisory (ICSA-25-162-05); the source record was last updated 2026-05-14. The supplied timeline shows the same publication date for the source and the CVE, with later republication updates tied to the C