CVE-2025-40573: CWE-35: Path Traversal: '.../...//' in Siemens SCALANCE LPE9403
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices are vulnerable to path traversal attacks. This could allow a privileged local attacker to restore backups that are outside the backup folder.
AI Analysis
Technical Summary
CVE-2025-40573 is a medium-severity path traversal vulnerability affecting Siemens SCALANCE LPE9403 devices, specifically all versions prior to V4.0 HF0. The vulnerability arises from improper validation of file paths during backup restoration processes, allowing a privileged local attacker to exploit the path traversal sequence '.../...//' to restore backup files located outside the intended backup directory. This CWE-35 (Path Traversal) flaw enables attackers with high-level privileges on the device to potentially overwrite or restore arbitrary files, impacting the integrity of the system by replacing critical configuration or operational files with malicious or corrupted versions. The vulnerability does not affect confidentiality or availability directly, and no user interaction is required. Exploitation requires local privileged access, which limits the attack vector to insiders or attackers who have already gained elevated access. No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS 3.1 base score is 4.4, reflecting the medium severity due to the limited attack vector and impact scope.
Potential Impact
For European organizations using Siemens SCALANCE LPE9403 devices, which are industrial network components often deployed in critical infrastructure and manufacturing environments, this vulnerability poses a risk to the integrity of network device configurations and operational stability. An attacker exploiting this flaw could restore malicious or corrupted backups, potentially disrupting network communication or causing misconfigurations that degrade system performance or safety. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact could lead to operational disruptions or facilitate further attacks if device configurations are altered. Given the critical role of SCALANCE devices in industrial control systems, especially in sectors like manufacturing, energy, and transportation, European organizations could face operational risks and compliance challenges if this vulnerability is exploited. The requirement for privileged local access reduces the likelihood of remote exploitation but underscores the importance of internal security controls and monitoring.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Upgrade SCALANCE LPE9403 devices to version V4.0 HF0 or later once Siemens releases the patch. 2) Restrict and monitor privileged local access to these devices, ensuring only authorized personnel have elevated permissions. 3) Implement strict access controls and network segmentation to limit the ability of attackers to gain local privileged access. 4) Audit and monitor backup and restore operations for unusual activity that could indicate exploitation attempts. 5) Employ integrity verification mechanisms for configuration files and backups to detect unauthorized modifications. 6) Maintain comprehensive logging and alerting on device management actions to enable rapid detection and response. 7) Conduct regular security training for personnel with device access to reduce insider threat risks. These steps go beyond generic advice by focusing on controlling privileged access, monitoring backup processes, and verifying integrity, which are critical given the local and privileged nature of the vulnerability.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-40573: CWE-35: Path Traversal: '.../...//' in Siemens SCALANCE LPE9403
Description
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices are vulnerable to path traversal attacks. This could allow a privileged local attacker to restore backups that are outside the backup folder.
AI-Powered Analysis
Technical Analysis
CVE-2025-40573 is a medium-severity path traversal vulnerability affecting Siemens SCALANCE LPE9403 devices, specifically all versions prior to V4.0 HF0. The vulnerability arises from improper validation of file paths during backup restoration processes, allowing a privileged local attacker to exploit the path traversal sequence '.../...//' to restore backup files located outside the intended backup directory. This CWE-35 (Path Traversal) flaw enables attackers with high-level privileges on the device to potentially overwrite or restore arbitrary files, impacting the integrity of the system by replacing critical configuration or operational files with malicious or corrupted versions. The vulnerability does not affect confidentiality or availability directly, and no user interaction is required. Exploitation requires local privileged access, which limits the attack vector to insiders or attackers who have already gained elevated access. No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS 3.1 base score is 4.4, reflecting the medium severity due to the limited attack vector and impact scope.
Potential Impact
For European organizations using Siemens SCALANCE LPE9403 devices, which are industrial network components often deployed in critical infrastructure and manufacturing environments, this vulnerability poses a risk to the integrity of network device configurations and operational stability. An attacker exploiting this flaw could restore malicious or corrupted backups, potentially disrupting network communication or causing misconfigurations that degrade system performance or safety. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact could lead to operational disruptions or facilitate further attacks if device configurations are altered. Given the critical role of SCALANCE devices in industrial control systems, especially in sectors like manufacturing, energy, and transportation, European organizations could face operational risks and compliance challenges if this vulnerability is exploited. The requirement for privileged local access reduces the likelihood of remote exploitation but underscores the importance of internal security controls and monitoring.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Upgrade SCALANCE LPE9403 devices to version V4.0 HF0 or later once Siemens releases the patch. 2) Restrict and monitor privileged local access to these devices, ensuring only authorized personnel have elevated permissions. 3) Implement strict access controls and network segmentation to limit the ability of attackers to gain local privileged access. 4) Audit and monitor backup and restore operations for unusual activity that could indicate exploitation attempts. 5) Employ integrity verification mechanisms for configuration files and backups to detect unauthorized modifications. 6) Maintain comprehensive logging and alerting on device management actions to enable rapid detection and response. 7) Conduct regular security training for personnel with device access to reduce insider threat risks. These steps go beyond generic advice by focusing on controlling privileged access, monitoring backup processes, and verifying integrity, which are critical given the local and privileged nature of the vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2025-04-16T08:20:17.031Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd5f06
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/14/2025, 9:40:52 PM
Last updated: 11/22/2025, 4:45:22 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.