CVE-2025-40574: CWE-732: Incorrect Permission Assignment for Critical Resource in Siemens SCALANCE LPE9403
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices do not properly assign permissions to critical ressources. This could allow a non-privileged local attacker to interact with the backupmanager service.
AI Analysis
Technical Summary
CVE-2025-40574 is a high-severity vulnerability affecting Siemens SCALANCE LPE9403 industrial network devices, specifically all versions prior to V4.0 HF0. The vulnerability is classified under CWE-732, which pertains to incorrect permission assignment for critical resources. In this case, the affected devices improperly assign permissions to critical system resources, notably the backupmanager service. This misconfiguration allows a non-privileged local attacker—someone with limited access on the device—to interact with the backupmanager service, which should normally be restricted. The CVSS v3.1 base score of 7.8 reflects the significant risk posed by this vulnerability, with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. Although no known exploits are reported in the wild yet, the vulnerability could allow an attacker to manipulate backup processes, potentially leading to unauthorized data access, data corruption, or denial of service. Given the critical role of SCALANCE LPE9403 devices in industrial and critical infrastructure networks, exploitation could disrupt operational technology environments, impacting industrial control systems and network reliability.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy, transportation, and utilities, this vulnerability poses a substantial risk. SCALANCE LPE9403 devices are commonly deployed in industrial network environments to provide secure and reliable communication. Exploitation could lead to unauthorized access to backup configurations and data, manipulation or deletion of backups, and disruption of network operations. This can result in operational downtime, loss of critical data, and potential cascading effects on industrial processes. Confidentiality breaches could expose sensitive operational data, while integrity violations could compromise system configurations and backups, undermining recovery efforts. Availability impacts could cause network outages or degraded performance, affecting production lines or critical infrastructure services. The local attack vector implies that attackers would need some form of local access, which could be achieved through compromised internal systems or insider threats. Given the increasing convergence of IT and OT networks in Europe, the risk of lateral movement to these devices is non-trivial. The high severity rating underscores the need for immediate attention to mitigate potential disruptions and data breaches.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading SCALANCE LPE9403 devices to version V4.0 HF0 or later, where the permission assignment issue is resolved. In the absence of an available patch, organizations should implement strict network segmentation to isolate SCALANCE devices from general IT networks and limit local access. Enforce strong access controls and monitoring on devices to detect unauthorized local interactions with critical services like backupmanager. Employ network intrusion detection systems (NIDS) tailored for industrial protocols to identify anomalous behavior. Regularly audit device configurations and permissions to ensure compliance with security best practices. Additionally, implement strict physical security controls to prevent unauthorized local access to these devices. Organizations should also develop and test incident response plans specific to industrial network devices to quickly respond to potential exploitation attempts. Vendor engagement is recommended to obtain any interim mitigations or guidance. Finally, raising awareness among operational technology personnel about the risks and signs of exploitation can help in early detection and prevention.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Sweden, Spain
CVE-2025-40574: CWE-732: Incorrect Permission Assignment for Critical Resource in Siemens SCALANCE LPE9403
Description
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices do not properly assign permissions to critical ressources. This could allow a non-privileged local attacker to interact with the backupmanager service.
AI-Powered Analysis
Technical Analysis
CVE-2025-40574 is a high-severity vulnerability affecting Siemens SCALANCE LPE9403 industrial network devices, specifically all versions prior to V4.0 HF0. The vulnerability is classified under CWE-732, which pertains to incorrect permission assignment for critical resources. In this case, the affected devices improperly assign permissions to critical system resources, notably the backupmanager service. This misconfiguration allows a non-privileged local attacker—someone with limited access on the device—to interact with the backupmanager service, which should normally be restricted. The CVSS v3.1 base score of 7.8 reflects the significant risk posed by this vulnerability, with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. Although no known exploits are reported in the wild yet, the vulnerability could allow an attacker to manipulate backup processes, potentially leading to unauthorized data access, data corruption, or denial of service. Given the critical role of SCALANCE LPE9403 devices in industrial and critical infrastructure networks, exploitation could disrupt operational technology environments, impacting industrial control systems and network reliability.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy, transportation, and utilities, this vulnerability poses a substantial risk. SCALANCE LPE9403 devices are commonly deployed in industrial network environments to provide secure and reliable communication. Exploitation could lead to unauthorized access to backup configurations and data, manipulation or deletion of backups, and disruption of network operations. This can result in operational downtime, loss of critical data, and potential cascading effects on industrial processes. Confidentiality breaches could expose sensitive operational data, while integrity violations could compromise system configurations and backups, undermining recovery efforts. Availability impacts could cause network outages or degraded performance, affecting production lines or critical infrastructure services. The local attack vector implies that attackers would need some form of local access, which could be achieved through compromised internal systems or insider threats. Given the increasing convergence of IT and OT networks in Europe, the risk of lateral movement to these devices is non-trivial. The high severity rating underscores the need for immediate attention to mitigate potential disruptions and data breaches.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading SCALANCE LPE9403 devices to version V4.0 HF0 or later, where the permission assignment issue is resolved. In the absence of an available patch, organizations should implement strict network segmentation to isolate SCALANCE devices from general IT networks and limit local access. Enforce strong access controls and monitoring on devices to detect unauthorized local interactions with critical services like backupmanager. Employ network intrusion detection systems (NIDS) tailored for industrial protocols to identify anomalous behavior. Regularly audit device configurations and permissions to ensure compliance with security best practices. Additionally, implement strict physical security controls to prevent unauthorized local access to these devices. Organizations should also develop and test incident response plans specific to industrial network devices to quickly respond to potential exploitation attempts. Vendor engagement is recommended to obtain any interim mitigations or guidance. Finally, raising awareness among operational technology personnel about the risks and signs of exploitation can help in early detection and prevention.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2025-04-16T08:20:17.032Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd5f5b
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/12/2025, 1:02:47 AM
Last updated: 8/3/2025, 12:37:28 AM
Views: 10
Related Threats
CVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighCVE-2025-47444: CWE-201 Insertion of Sensitive Information Into Sent Data in Liquid Web GiveWP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.