PatchSiren cyber security CVE debrief
CVE-2025-40736 Siemens CVE debrief
CVE-2025-40736 is a critical vulnerability in Siemens SINEC NMS where an exposed endpoint can be used to modify administrative credentials without authorization. According to the advisory, an unauthenticated attacker could reset the superadmin password and gain full control of the application. Siemens advises updating to V4.0 or later.
- Vendor
- Siemens
- Product
- SINEC NMS
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-07-08
- Original CVE updated
- 2025-07-08
- Advisory published
- 2025-07-08
- Advisory updated
- 2025-07-08
Who should care
Organizations running Siemens SINEC NMS, especially OT/industrial operations teams, platform administrators, and security teams responsible for externally reachable management interfaces or privileged account protection.
Technical summary
The advisory describes a network-reachable issue with no authentication required (CVSS: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected application exposes an endpoint that permits unauthorized modification of administrative credentials, enabling password reset of the superadmin account and resulting in full administrative compromise if abused.
Defensive priority
Immediate / urgent. This is a critical, remotely reachable, unauthenticated administrative takeover issue with high confidentiality, integrity, and availability impact.
Recommended defensive actions
- Update Siemens SINEC NMS to V4.0 or later as directed by Siemens.
- Restrict network exposure of SINEC NMS management interfaces to trusted administrative networks only.
- Review privileged account activity for unexpected password changes, logins, or configuration changes.
- If compromise is suspected, rotate administrative credentials and assess for unauthorized changes across the application and connected systems.
- Follow CISA and Siemens industrial control system hardening guidance for defense-in-depth and access control.
Evidence notes
The supplied CISA CSAF advisory for ICSA-25-191-01 states that the affected application exposes an endpoint allowing unauthorized modification of administrative credentials and that this could let an unauthenticated attacker reset the superadmin password and gain full control of the application. The provided CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) supports remote, no-auth, high-impact risk. The only remediation explicitly provided in the source corpus is to update to V4.0 or later.
Official resources
-
CVE-2025-40736 CVE record
CVE.org
-
CVE-2025-40736 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed on 2025-07-08 via CISA ICS Advisory ICSA-25-191-01 and the Siemens advisory referenced in the supplied source corpus.