CVE-2025-40573: CWE-35: Path Traversal: '.../...//' in Siemens SCALANCE LPE9403
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices are vulnerable to path traversal attacks. This could allow a privileged local attacker to restore backups that are outside the backup folder.
AI Analysis
Technical Summary
CVE-2025-40573 is a medium-severity path traversal vulnerability affecting Siemens SCALANCE LPE9403 devices, specifically all versions prior to V4.0 HF0. The vulnerability arises from improper validation of file paths during backup restoration processes, allowing a privileged local attacker to exploit the path traversal sequence '.../...//' to restore backup files located outside the intended backup directory. This CWE-35 (Path Traversal) flaw enables attackers with high-level privileges on the device to potentially overwrite or restore arbitrary files, impacting the integrity of the system by replacing critical configuration or operational files with malicious or corrupted versions. The vulnerability does not affect confidentiality or availability directly, and no user interaction is required. Exploitation requires local privileged access, which limits the attack vector to insiders or attackers who have already gained elevated access. No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS 3.1 base score is 4.4, reflecting the medium severity due to the limited attack vector and impact scope.
Potential Impact
For European organizations using Siemens SCALANCE LPE9403 devices, which are industrial network components often deployed in critical infrastructure and manufacturing environments, this vulnerability poses a risk to the integrity of network device configurations and operational stability. An attacker exploiting this flaw could restore malicious or corrupted backups, potentially disrupting network communication or causing misconfigurations that degrade system performance or safety. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact could lead to operational disruptions or facilitate further attacks if device configurations are altered. Given the critical role of SCALANCE devices in industrial control systems, especially in sectors like manufacturing, energy, and transportation, European organizations could face operational risks and compliance challenges if this vulnerability is exploited. The requirement for privileged local access reduces the likelihood of remote exploitation but underscores the importance of internal security controls and monitoring.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Upgrade SCALANCE LPE9403 devices to version V4.0 HF0 or later once Siemens releases the patch. 2) Restrict and monitor privileged local access to these devices, ensuring only authorized personnel have elevated permissions. 3) Implement strict access controls and network segmentation to limit the ability of attackers to gain local privileged access. 4) Audit and monitor backup and restore operations for unusual activity that could indicate exploitation attempts. 5) Employ integrity verification mechanisms for configuration files and backups to detect unauthorized modifications. 6) Maintain comprehensive logging and alerting on device management actions to enable rapid detection and response. 7) Conduct regular security training for personnel with device access to reduce insider threat risks. These steps go beyond generic advice by focusing on controlling privileged access, monitoring backup processes, and verifying integrity, which are critical given the local and privileged nature of the vulnerability.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-40573: CWE-35: Path Traversal: '.../...//' in Siemens SCALANCE LPE9403
Description
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices are vulnerable to path traversal attacks. This could allow a privileged local attacker to restore backups that are outside the backup folder.
AI-Powered Analysis
Technical Analysis
CVE-2025-40573 is a medium-severity path traversal vulnerability affecting Siemens SCALANCE LPE9403 devices, specifically all versions prior to V4.0 HF0. The vulnerability arises from improper validation of file paths during backup restoration processes, allowing a privileged local attacker to exploit the path traversal sequence '.../...//' to restore backup files located outside the intended backup directory. This CWE-35 (Path Traversal) flaw enables attackers with high-level privileges on the device to potentially overwrite or restore arbitrary files, impacting the integrity of the system by replacing critical configuration or operational files with malicious or corrupted versions. The vulnerability does not affect confidentiality or availability directly, and no user interaction is required. Exploitation requires local privileged access, which limits the attack vector to insiders or attackers who have already gained elevated access. No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS 3.1 base score is 4.4, reflecting the medium severity due to the limited attack vector and impact scope.
Potential Impact
For European organizations using Siemens SCALANCE LPE9403 devices, which are industrial network components often deployed in critical infrastructure and manufacturing environments, this vulnerability poses a risk to the integrity of network device configurations and operational stability. An attacker exploiting this flaw could restore malicious or corrupted backups, potentially disrupting network communication or causing misconfigurations that degrade system performance or safety. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact could lead to operational disruptions or facilitate further attacks if device configurations are altered. Given the critical role of SCALANCE devices in industrial control systems, especially in sectors like manufacturing, energy, and transportation, European organizations could face operational risks and compliance challenges if this vulnerability is exploited. The requirement for privileged local access reduces the likelihood of remote exploitation but underscores the importance of internal security controls and monitoring.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Upgrade SCALANCE LPE9403 devices to version V4.0 HF0 or later once Siemens releases the patch. 2) Restrict and monitor privileged local access to these devices, ensuring only authorized personnel have elevated permissions. 3) Implement strict access controls and network segmentation to limit the ability of attackers to gain local privileged access. 4) Audit and monitor backup and restore operations for unusual activity that could indicate exploitation attempts. 5) Employ integrity verification mechanisms for configuration files and backups to detect unauthorized modifications. 6) Maintain comprehensive logging and alerting on device management actions to enable rapid detection and response. 7) Conduct regular security training for personnel with device access to reduce insider threat risks. These steps go beyond generic advice by focusing on controlling privileged access, monitoring backup processes, and verifying integrity, which are critical given the local and privileged nature of the vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2025-04-16T08:20:17.031Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd5f06
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/14/2025, 9:40:52 PM
Last updated: 8/3/2025, 12:37:28 AM
Views: 11
Related Threats
CVE-2025-9007: Buffer Overflow in Tenda CH22
HighCVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.