CVE Alert: CVE-2025-40798 – Siemens – SIMATIC PCS neo V4.1

CVE-2025-40798

HIGHNo exploitation known

A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), User Management Component (UMC) (All versions < V2.15.1.3). Affected products contain a out-of-bounds read vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to cause a denial of service condition.

CVSS v3.1 (7.5)
Vendor
Siemens, Siemens, Siemens
Product
SIMATIC PCS neo V4.1, SIMATIC PCS neo V5.0, User Management Component (UMC)
Versions
0 lt * | 0 lt * | 0 lt V2.15.1.3
CWE
CWE-125, CWE-125: Out-of-bounds Read
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published
2025-09-09T08:48:05.138Z
Updated
2025-09-09T08:48:05.138Z

AI Summary Analysis

Risk verdict

High risk of unauthenticated remote denial-of-service via network-accessible components; no exploitation indicators provided to confirm active campaigns.

Why this matters

An unauthenticated attacker can trigger a DoS without user interaction, potentially taking critical automation or management functions offline. In industrial environments, even brief outages can halt production, impact safety interlocks, and disrupt maintenance windows, with knock-on costs across scheduling and supply chains.

Most likely attack path

Exploitation requires no privileges and no user interaction, over the network. An attacker could repeatedly trigger malformed inputs to the exposed UMC component, causing a crash or unavailability. Lateral movement is less likely to be immediate since there is no demonstrated privilege escalation or code execution, but repeated DoS may degrade supervisory control or push operators toward unsafe states.

Who is most exposed

Facilities deploying network-connected PCS neo and UMC in manufacturing/industrial control environments are at risk, especially where remote maintenance or VPN-accessed interfaces are exposed to less trusted networks or poor segmentation.

Detection ideas

  • Unusual spikes or crashes in the management/UMC services.
  • Logs showing out-of-bounds read indications or memory-access errors.
  • Sudden service restarts or unavailable control interfaces.
  • Anomalous unauthenticated network requests to UMC-facing endpoints.
  • IDS/IPS alerts for abnormal traffic patterns targeting UMC ports.

Mitigation and prioritisation

  • Apply vendor patch to V2.15.1.3 or later for the UMC component; validate compatibility before rollout.
  • Enforce network segmentation; restrict external access to UMC and related management interfaces.
  • Implement allowlisting and strongest available authentication on management paths; monitor for repeated failed attempts.
  • Schedule patching in a controlled window with rollback plans; test in a staging environment first.
  • If KEV or EPSS indicators become available (e.g., EPSS ≥ 0.5 or active KEV), treat as priority 1. Otherwise, prioritise patching as soon as feasible given production impact.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.