CVE-2025-40574

7.8 HIGH

📋 TL;DR

A local privilege escalation vulnerability in Siemens SCALANCE LPE9403 industrial routers allows non-privileged local attackers to interact with the backupmanager service. This could enable unauthorized access to critical system resources. Only SCALANCE LPE9403 devices running versions before V4.0 HF0 are affected.

💻 Affected Systems

Products:
  • Siemens SCALANCE LPE9403 (6GK5998-3GS00-2AC2)
Versions: All versions < V4.0 HF0
Operating Systems: Embedded industrial router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific SCALANCE LPE9403 model with part number 6GK5998-3GS00-2AC2. Other SCALANCE products are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain administrative control of the device, potentially disrupting industrial operations, exfiltrating sensitive configuration data, or using the device as a pivot point into industrial control networks.

🟠

Likely Case

Local attackers could access or modify backup configurations, potentially leading to service disruption or unauthorized access to network settings.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the local device only, preventing lateral movement.

🌐 Internet-Facing: LOW - This requires local access to the device, so internet-facing exposure is minimal unless combined with other vulnerabilities.
🏢 Internal Only: MEDIUM - Industrial networks often have physical security, but insider threats or compromised accounts could exploit this locally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to the device. The vulnerability involves improper permission assignment (CWE-732), suggesting straightforward exploitation once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V4.0 HF0

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-327438.html

Restart Required: Yes

Instructions:

1. Download firmware V4.0 HF0 from Siemens Industrial Security. 2. Backup current configuration. 3. Upload and install the new firmware via web interface or CLI. 4. Restart the device. 5. Verify the version shows V4.0 HF0 or higher.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and network access to SCALANCE devices to authorized personnel only.

Network Segmentation

all

Isolate SCALANCE devices in separate VLANs with strict firewall rules to prevent unauthorized access.

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized local access to devices.
  • Monitor device logs for unusual backupmanager service activity or unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check the firmware version via web interface (System > Device Information) or CLI command 'show version'. If version is below V4.0 HF0, the device is vulnerable.

Check Version:

show version

Verify Fix Applied:

After patching, verify the firmware version shows V4.0 HF0 or higher in the web interface or via CLI.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to backupmanager service
  • Unusual backup operations by non-admin users
  • Permission change events in system logs

Network Indicators:

  • Unexpected connections to backup-related ports from unauthorized IPs
  • Unusual traffic patterns to/from SCALANCE devices

SIEM Query:

source="scalance_logs" AND (event_type="backup_access" OR user!="admin" AND service="backupmanager")

🔗 References

📤 Share & Export