PatchSiren cyber security CVE debrief
CVE-2026-25571 Siemens CVE debrief
CVE-2026-25571 is a medium-severity issue in Siemens SICAM SIAPP SDK affecting versions before V2.1.7. According to the advisory, the client component does not enforce maximum length checks on certain variables before use, which could let an attacker supply oversized input that triggers a stack overflow, crashes the process, and may result in denial of service. Siemens lists V2.1.7 or later as the fix.
- Vendor
- Siemens
- Product
- SICAM SIAPP SDK
- CVSS
- MEDIUM 5.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-03-10
- Original CVE updated
- 2026-03-17
- Advisory published
- 2026-03-10
- Advisory updated
- 2026-03-17
Who should care
Organizations using Siemens SICAM SIAPP SDK, especially those embedding the client component in industrial or operational technology environments, should review whether any deployed products include affected versions below V2.1.7.
Technical summary
The supplied advisory describes a length-validation weakness in the SICAM SIAPP SDK client component. The stated impact is a stack overflow leading to process crash and availability loss. The provided CVSS v3.1 vector is AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H, which aligns with availability-only impact and indicates that exploitation is assessed as higher complexity.
Defensive priority
Medium. The issue is not marked as KEV and the disclosed impact is denial of service rather than code execution, but it can still disrupt affected industrial software components if vulnerable versions remain deployed.
Recommended defensive actions
- Upgrade Siemens SICAM SIAPP SDK to V2.1.7 or later.
- Inventory products and integrations that include SICAM SIAPP SDK and confirm whether they use affected versions below V2.1.7.
- Apply vendor and CISA guidance for industrial control system defensive practices, including segmentation and defense-in-depth controls.
- Monitor for crashes or abnormal termination in components that rely on the affected SDK client functionality.
Evidence notes
All substantive claims are taken from the supplied CISA CSAF advisory record for ICSA-26-076-04 and its Siemens ProductCERT references. The advisory states the affected product as Siemens SICAM SIAPP SDK vers:intdot/<2.1.7, describes missing maximum length checks, and recommends updating to V2.1.7 or later. Timing context uses the supplied publication date of 2026-03-10 and the republication/revision date of 2026-03-17.
Official resources
-
CVE-2026-25571 CVE record
CVE.org
-
CVE-2026-25571 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in the supplied advisory on 2026-03-10, with a CISA republication/update on 2026-03-17. This debrief uses the published and modified dates from the advisory timeline, not generation time.