CVE-2025-40584

5.5 MEDIUM
XXE

📋 TL;DR

This CVE describes an XML External Entity (XXE) injection vulnerability in multiple Siemens SIMOTION and SINAMICS engineering software versions. Attackers can exploit this by tricking users into opening malicious XML files, potentially allowing arbitrary file read access on the system. Affected users include anyone running vulnerable versions of these Siemens industrial automation software tools.

💻 Affected Systems

Products:
  • SIMOTION SCOUT TIA V5.4
  • SIMOTION SCOUT TIA V5.5
  • SIMOTION SCOUT TIA V5.6
  • SIMOTION SCOUT TIA V5.7
  • SIMOTION SCOUT V5.4
  • SIMOTION SCOUT V5.5
  • SIMOTION SCOUT V5.6
  • SIMOTION SCOUT V5.7
  • SINAMICS STARTER V5.5
  • SINAMICS STARTER V5.6
  • SINAMICS STARTER V5.7
Versions: All versions of V5.4, V5.5; V5.6 < V5.6 SP1 HF7; V5.7 < V5.7 SP1 HF1 for SIMOTION; V5.7 < V5.7 HF2 for SINAMICS STARTER
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Requires user to open a malicious XML file with the application.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could read sensitive system files, configuration files, or other data accessible to the application user, potentially leading to credential theft, intellectual property theft, or reconnaissance for further attacks.

🟠

Likely Case

Local file disclosure of files accessible to the application user, potentially including project files, configuration data, or other sensitive information stored on the system.

🟢

If Mitigated

Limited impact if proper network segmentation and user privilege restrictions are in place, though file read capabilities would still be possible within the user's context.

🌐 Internet-Facing: LOW - These are engineering workstation applications typically not exposed to the internet.
🏢 Internal Only: MEDIUM - Requires user interaction (opening malicious XML file) but could be exploited via phishing or compromised internal resources.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to get user to open malicious XML file. No authentication bypass needed once file is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SIMOTION SCOUT TIA V5.6 SP1 HF7, SIMOTION SCOUT TIA V5.7 SP1 HF1, SIMOTION SCOUT V5.6 SP1 HF7, SIMOTION SCOUT V5.7 SP1 HF1, SINAMICS STARTER V5.7 HF2

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-186293.html

Restart Required: No

Instructions:

1. Download the appropriate hotfix from Siemens Support Portal. 2. Close all affected Siemens applications. 3. Run the hotfix installer. 4. Verify installation by checking version numbers.

🔧 Temporary Workarounds

Restrict XML file handling

Windows

Configure Windows to open XML files with a different application or implement application whitelisting to prevent execution of malicious XML files.

🧯 If You Can't Patch

  • Implement strict user training about opening untrusted XML files
  • Use application control solutions to restrict execution of Siemens applications to trusted users only

🔍 How to Verify

Check if Vulnerable:

Check installed version numbers in Siemens application Help > About menu and compare against affected versions list.

Check Version:

Check via Siemens application interface: Help > About or review installed programs in Windows Control Panel.

Verify Fix Applied:

Verify version numbers match or exceed patched versions: V5.6 SP1 HF7, V5.7 SP1 HF1, or V5.7 HF2 depending on product.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from Siemens applications
  • Multiple failed file read attempts from application process

Network Indicators:

  • Outbound connections from Siemens applications to unexpected destinations when opening XML files

SIEM Query:

Process execution: (process_name:"scout.exe" OR process_name:"starter.exe") AND file_access_pattern:"*.xml" AND anomalous_behavior

🔗 References

📤 Share & Export