SB20251210174 - Multiple vulnerabilities in Siemens SIMATIC CN 4100
Published: December 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Command Injection (CVE-ID: CVE-2025-40937)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within REST API. A remote user can pass specially crafted data to the application and execute arbitrary commands.
2) Use of hard-coded credentials (CVE-ID: CVE-2025-40938)
The vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker can access the affected system using the hard-coded credentials.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Improper access control (CVE-ID: CVE-2025-40939)
The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to the affected device contains a USB port which allows unauthenticated connections. An attacker with physical access can bypass implemented security restrictions and perform a denial of service (DoS) attack.
4) Information disclosure (CVE-ID: CVE-2025-40940)
The vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to the affected application exhibits inconsistent SNMP behavior. A remote administrator can gain unauthorized access to sensitive information on the system.
5) Information disclosure (CVE-ID: CVE-2025-40941)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the affected devices exposes server information in its responses. A remote user can gain unauthorized access to sensitive information on the system.
Remediation
Install update from vendor's website.