CVE Alert: CVE-2025-40796 – Siemens – SIMATIC PCS neo V4.1

CVE-2025-40796

HIGHNo exploitation known

A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), User Management Component (UMC) (All versions < V2.15.1.3). Affected products contain a out-of-bounds read vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to cause a denial of service condition.

CVSS v3.1 (7.5)
Vendor
Siemens, Siemens, Siemens
Product
SIMATIC PCS neo V4.1, SIMATIC PCS neo V5.0, User Management Component (UMC)
Versions
0 lt * | 0 lt * | 0 lt V2.15.1.3
CWE
CWE-125, CWE-125: Out-of-bounds Read
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published
2025-09-09T08:48:02.550Z
Updated
2025-09-09T08:48:02.550Z

AI Summary Analysis

Risk verdict

High risk: unauthenticated remote denial-of-service potential against SIMATIC PCS neo and the UMC component; given network-accessible preconditions, exploitation could disrupt availability.

Why this matters

An attacker could disable or degrade management functionality, impacting engineering workflows and production systems reliant on PCS neo. In environments where the UMC is exposed to broader networks, a successful DoS could cascade to downstream PLCs or HMI interfaces, delaying maintenance and commissioning.

Most likely attack path

No authentication or user interaction is required, with network access as the only precondition. An attacker sends crafted input to the UMC/management surface, triggering an out-of-bounds read that crashes or freezes the service, causing a DoS and potential service instability across the host ecosystem.

Who is most exposed

Industries using Siemens PCS neo in networked OT/ICS environments with UMC integration are at risk, especially where management components are reachable from enterprise networks or remote access points without strict access controls.

Detection ideas

  • Sudden service crashes or restarts of UMC/PCS neo management components.
  • Abrupt CPU or memory spikes on affected hosts.
  • Error logs indicating out-of-bounds read or faulting modules; crash dumps tied to UMC.
  • Unusual or repeated network requests to management interfaces without authentication.
  • IDS/IPS alerts for abnormal traffic to UMC ports.

Mitigation and prioritisation

  • Patch to UMC v2.15.1.3 or later and apply latest PCS neo updates.
  • Restrict exposure: block unauthenticated access to management interfaces; enforce VPN or jump-host access; segment OT from IT networks.
  • Implement compensating controls: firewall ACLs, rate limiting, and input validation hardening; enable comprehensive logging.
  • Change-management: test patches in a staging environment; schedule a formal update window; verify service continuity post-patch.
  • If KEV true or EPSS ≥ 0.5, treat as priority 1; otherwise plan for prompt remediation with defined escalation SLAs.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.