PatchSiren cyber security CVE debrief
CVE-2025-40941 Siemens CVE debrief
CVE-2025-40941 is a medium-severity information disclosure issue affecting Siemens SIMATIC CN 4100. According to the advisory, affected devices may expose server information in responses, which could help an attacker with network access profile the target and increase the likelihood of targeted attacks. Siemens provides a fix in V4.0.1 or later, and the supplied corpus does not indicate KEV listing or known active exploitation.
- Vendor
- Siemens
- Product
- SIMATIC CN 4100
- CVSS
- MEDIUM 4.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-12-09
- Original CVE updated
- 2025-12-09
- Advisory published
- 2025-12-09
- Advisory updated
- 2025-12-09
Who should care
OT/ICS operators, Siemens SIMATIC CN 4100 administrators, network defenders monitoring industrial environments, and asset owners who expose this device to broader internal networks or remote management paths.
Technical summary
The issue is described as server information being exposed in device responses. CISA lists the CVSS v3.1 vector as AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N (4.3), indicating network-accessible exploitation with low privileges and a confidentiality impact only. The supplier remediation in the corpus is to update to V4.0.1 or later.
Defensive priority
Moderate priority. The impact is limited to information disclosure, but the device is in an OT/ICS context where exposed server details can aid reconnaissance and follow-on targeting.
Recommended defensive actions
- Verify whether Siemens SIMATIC CN 4100 devices are present in your environment and identify their firmware versions.
- Apply Siemens' remediation by updating to V4.0.1 or later.
- Restrict network access to the device to trusted management segments and minimize exposure to unnecessary internal or external hosts.
- Review logs and management exposure for unexpected access to SIMATIC CN 4100 services.
- Use the CISA ICS recommended practices and defense-in-depth guidance for segmentation and hardening of industrial networks.
Evidence notes
Source corpus: CISA CSAF advisory ICSA-26-015-12 and Siemens advisory SSA-416652. The advisory text states that affected devices expose server information in responses and that this could aid targeted attacks. The supplied corpus lists Siemens as vendor, SIMATIC CN 4100 as product, CVSS 3.1 vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, and remediation to update to V4.0.1 or later. Enrichment in the corpus indicates no KEV entry and no known ransomware campaign use.
Official resources
-
CVE-2025-40941 CVE record
CVE.org
-
CVE-2025-40941 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed via CISA and Siemens advisories in the supplied corpus on 2025-12-09.