PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-40937 Siemens CVE debrief

CVE-2025-40937 affects Siemens SIMATIC CN 4100 and was publicly published on 2025-12-09. According to the CISA CSAF advisory, the application does not properly validate input parameters in its REST API, which can lead to improper handling of unexpected arguments. Siemens and CISA describe the impact as a condition that could allow an authenticated attacker to execute arbitrary code with limited privileges. Siemens provides a fix in version V4.0.1 or later.

Vendor
Siemens
Product
SIMATIC CN 4100
CVSS
HIGH 8.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-12-09
Original CVE updated
2025-12-09
Advisory published
2025-12-09
Advisory updated
2025-12-09

Who should care

Organizations running Siemens SIMATIC CN 4100, especially industrial control system operators, plant administrators, and security teams responsible for authenticated service access and vendor patch management.

Technical summary

The advisory describes a REST API input validation weakness in SIMATIC CN 4100. The CVSS vector provided is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L, indicating network-reachable impact, low attack complexity, and required low privileges. The stated outcome is possible arbitrary code execution with limited privileges through improper handling of unexpected arguments.

Defensive priority

High. The CVSS score is 8.3 and the affected product is an ICS-related Siemens system with a vendor fix available. Prioritize patching and exposure reduction for any deployments where authenticated REST API access is reachable.

Recommended defensive actions

  • Update Siemens SIMATIC CN 4100 to V4.0.1 or later as recommended by the vendor.
  • Review which administrators or services can authenticate to the product's REST API and restrict access to the minimum necessary.
  • Apply industrial-control defense-in-depth practices and limit network reachability to management interfaces where possible.
  • Monitor Siemens and CISA advisory channels for any follow-on guidance related to ICSA-26-015-12 / SSA-416652.
  • Validate that asset inventories and patch records reflect the affected product and the remediation version.

Evidence notes

Source details come from the supplied CISA CSAF record for ICSA-26-015-12 and the referenced Siemens advisory SSA-416652. The advisory states the REST API parameter-validation issue and the potential for authenticated arbitrary code execution with limited privileges. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L, and the remediation listed is V4.0.1 or later. KEV status in the supplied enrichment is false.

Official resources

Publicly disclosed via CISA CSAF / Siemens advisory on 2025-12-09; the supplied enrichment does not list the issue in CISA KEV.