CVE-2025-40594
Plain English Summary
AI-powered analysis for quick understanding
An attacker can gain unauthorized access to sensitive settings on certain Siemens SINAMICS devices by performing a factory reset without proper permissions, potentially allowing them to manipulate configuration data. This vulnerability affects specific firmware versions and can be exploited if the attacker has previously accessed the device, as it involves leftover privileges from earlier sessions.
Technical Description
A vulnerability has been identified in SINAMICS G220 V6.4 (All versions < V6.4 HF2), SINAMICS S200 V6.4 (All versions < V6.4 HF7), SINAMICS S210 V6.4 (All versions < V6.4 HF2). The affected devices allow a factory reset to be executed without the required privileges due to improper privilege management as well as manipulation of configuration data because of leaked privileges of previous sessions. This could allow an unauthorized attacker to escalate their privileges.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Sep 9, 2025
7 months ago
Last Modified
Mar 10, 2026
28 days ago
Vendor
siemens
Product
sinamics g220 firmware
Related Vulnerabilities
An attacker with valid login credentials can exploit a flaw in the SINEC Security Monitor to alter its configuration settings, potentially leading to unauthorized changes in the system's security. This vulnerability affects all versions prior to 4.9.0 and arises from the application not properly checking user input against a list of acceptable values.
An attacker can create files in unintended locations on the system, potentially altering or corrupting important files, if they can access the SINEC Security Monitor application version before 4.9.0. This vulnerability does not require authentication, meaning anyone can exploit it if they know how to send the right request to the application.
This vulnerability allows an attacker with low-level access to the SINEC Security Monitor to run high-level commands on the operating system, potentially taking control of the system. The attacker must be authenticated, meaning they need some level of access to the system to exploit this flaw.
This vulnerability allows a low-level authenticated attacker to run any code they want with full control over the operating system, potentially compromising the entire system. It affects all versions of the SINEC Security Monitor before version 4.9.0, and the attacker must already have some form of access to the system.