Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40939: CWE-284: Improper Access Control in Siemens SIMATIC CN 4100

0
Medium
VulnerabilityCVE-2025-40939cvecve-2025-40939cwe-284
Published: Tue Dec 09 2025 (12/09/2025, 10:44:37 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: SIMATIC CN 4100

Description

A vulnerability has been identified in SIMATIC CN 4100 (All versions < V4.0.1). The affected device contains a USB port which allows unauthenticated connections. This could allow an attacker with physical access to the device to trigger reboot that could cause denial of service condition.

AI-Powered Analysis

AILast updated: 12/16/2025, 11:40:50 UTC

Technical Analysis

CVE-2025-40939 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Siemens SIMATIC CN 4100 devices with firmware versions prior to 4.0.1. The affected device includes a USB port that permits unauthenticated connections, meaning an attacker with physical access can connect to this port without needing credentials or user interaction. By exploiting this access, the attacker can trigger a device reboot, causing a denial of service condition. The vulnerability does not impact confidentiality or integrity but affects availability by disrupting device operation. The attack vector is physical access, which limits remote exploitation but raises concerns in environments where physical security is insufficient. The CVSS v3.1 score is 4.6 (medium), reflecting the ease of exploitation (low complexity, no privileges or user interaction) but limited scope due to physical access requirements. No patches or known exploits are currently available, indicating the vulnerability is newly disclosed. Siemens SIMATIC CN 4100 is commonly used in industrial automation and control systems, where availability is critical. An unexpected reboot could interrupt industrial processes, leading to operational downtime and potential safety risks. The vulnerability highlights the importance of securing physical interfaces on industrial devices to prevent unauthorized manipulation.

Potential Impact

For European organizations, especially those in manufacturing, energy, transportation, and critical infrastructure sectors, this vulnerability poses a risk of operational disruption. The SIMATIC CN 4100 is often deployed in industrial environments where continuous availability is essential. An attacker with physical access could cause repeated device reboots, leading to denial of service and potential cascading effects on industrial processes. While confidentiality and integrity are not directly impacted, the availability impact could result in production delays, safety hazards, and financial losses. The requirement for physical access limits the threat to insiders or attackers who can breach physical security controls. However, in environments with less stringent physical security or where devices are in accessible locations, the risk is higher. European organizations must consider the operational impact and potential safety implications of device downtime caused by this vulnerability.

Mitigation Recommendations

1. Enhance physical security controls around SIMATIC CN 4100 devices to prevent unauthorized physical access, including locked cabinets, restricted access zones, and surveillance. 2. Monitor devices for unexpected reboots or operational anomalies that could indicate exploitation attempts. 3. Implement strict access control policies for personnel with physical access to industrial control systems. 4. Segregate critical devices from general access areas to reduce exposure. 5. Engage with Siemens for firmware updates or patches as they become available and plan timely deployment. 6. Conduct regular security audits and physical inspections of industrial environments to detect potential tampering. 7. Consider additional protective measures such as USB port locks or disabling unused physical interfaces if supported by the device. 8. Develop incident response plans that include procedures for handling denial of service caused by physical tampering.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2025-04-16T09:06:15.878Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6938009229016b16de45fef3

Added to database: 12/9/2025, 10:57:22 AM

Last enriched: 12/16/2025, 11:40:50 AM

Last updated: 2/6/2026, 11:45:17 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats