PatchSiren cyber security CVE debrief
CVE-2025-40567 Siemens CVE debrief
CVE-2025-40567 is a Siemens industrial network device vulnerability in the web interface’s "Load Rollback" function. An authenticated remote user with only the guest role can cause the device to roll back configuration changes made by privileged users, creating an integrity risk for operational settings. Siemens and CISA list 15 affected products and advise updating to V3.2 or later.
- Vendor
- Siemens
- Product
- RUGGEDCOM RST2428P (6GK6242-6PA00)
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-06-10
- Original CVE updated
- 2026-01-14
- Advisory published
- 2025-06-10
- Advisory updated
- 2026-01-14
Who should care
OT and industrial network teams running Siemens RUGGEDCOM RST2428P or affected SCALANCE models should care most, especially where the web interface is exposed and guest accounts are enabled.
Technical summary
The flaw is an incorrect authorization check in the "Load Rollback" feature. The source advisory states that a remote authenticated attacker with guest privileges can invoke rollback behavior on affected devices and revert privileged configuration changes. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N, indicating network reachability and a primary integrity impact.
Defensive priority
Medium overall; higher priority in environments that expose the device web interface or rely on guest-role access controls for operational segmentation.
Recommended defensive actions
- Identify exposed Siemens devices in the affected product list and confirm firmware/version status.
- Update to V3.2 or later using the vendor remediation referenced in the advisory.
- Restrict or remove guest-role access to the web interface where operationally feasible.
- Review recent configuration history and rollback events for unexpected changes.
- Follow CISA ICS hardening and defense-in-depth guidance for management-plane exposure and account control.
Evidence notes
Primary evidence comes from CISA CSAF advisory ICSA-25-162-04, which republishes Siemens ProductCERT advisory SSA-693776 and describes the incorrect authorization check in "Load Rollback." The source metadata lists CVE publication on 2025-06-10 and a later CISA republication on 2026-01-14. The advisory lists 15 affected Siemens products, including RUGGEDCOM RST2428P and multiple SCALANCE XCH/XCM/XRH/XRM models, with remediation to update to V3.2 or later. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N.
Official resources
-
CVE-2025-40567 CVE record
CVE.org
-
CVE-2025-40567 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in CISA CSAF advisory ICSA-25-162-04 on 2025-06-10, based on Siemens ProductCERT advisory SSA-693776, with a later CISA republication on 2026-01-14.