Skip to main content

CVE-2025-40573: CWE-35: Path Traversal: '.../...//' in Siemens SCALANCE LPE9403

Medium
VulnerabilityCVE-2025-40573cvecve-2025-40573cwe-35
Published: Tue May 13 2025 (05/13/2025, 09:38:56 UTC)
Source: CVE
Vendor/Project: Siemens
Product: SCALANCE LPE9403

Description

A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices are vulnerable to path traversal attacks. This could allow a privileged local attacker to restore backups that are outside the backup folder.

AI-Powered Analysis

AILast updated: 07/14/2025, 21:40:52 UTC

Technical Analysis

CVE-2025-40573 is a medium-severity path traversal vulnerability affecting Siemens SCALANCE LPE9403 devices, specifically all versions prior to V4.0 HF0. The vulnerability arises from improper validation of file paths during backup restoration processes, allowing a privileged local attacker to exploit the path traversal sequence '.../...//' to restore backup files located outside the intended backup directory. This CWE-35 (Path Traversal) flaw enables attackers with high-level privileges on the device to potentially overwrite or restore arbitrary files, impacting the integrity of the system by replacing critical configuration or operational files with malicious or corrupted versions. The vulnerability does not affect confidentiality or availability directly, and no user interaction is required. Exploitation requires local privileged access, which limits the attack vector to insiders or attackers who have already gained elevated access. No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS 3.1 base score is 4.4, reflecting the medium severity due to the limited attack vector and impact scope.

Potential Impact

For European organizations using Siemens SCALANCE LPE9403 devices, which are industrial network components often deployed in critical infrastructure and manufacturing environments, this vulnerability poses a risk to the integrity of network device configurations and operational stability. An attacker exploiting this flaw could restore malicious or corrupted backups, potentially disrupting network communication or causing misconfigurations that degrade system performance or safety. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact could lead to operational disruptions or facilitate further attacks if device configurations are altered. Given the critical role of SCALANCE devices in industrial control systems, especially in sectors like manufacturing, energy, and transportation, European organizations could face operational risks and compliance challenges if this vulnerability is exploited. The requirement for privileged local access reduces the likelihood of remote exploitation but underscores the importance of internal security controls and monitoring.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Upgrade SCALANCE LPE9403 devices to version V4.0 HF0 or later once Siemens releases the patch. 2) Restrict and monitor privileged local access to these devices, ensuring only authorized personnel have elevated permissions. 3) Implement strict access controls and network segmentation to limit the ability of attackers to gain local privileged access. 4) Audit and monitor backup and restore operations for unusual activity that could indicate exploitation attempts. 5) Employ integrity verification mechanisms for configuration files and backups to detect unauthorized modifications. 6) Maintain comprehensive logging and alerting on device management actions to enable rapid detection and response. 7) Conduct regular security training for personnel with device access to reduce insider threat risks. These steps go beyond generic advice by focusing on controlling privileged access, monitoring backup processes, and verifying integrity, which are critical given the local and privileged nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-04-16T08:20:17.031Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd5f06

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/14/2025, 9:40:52 PM

Last updated: 8/3/2025, 12:37:28 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats