As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
PRODUCT DESCRIPTION
Industrial Edge Cloud Device (IECD) offers you the Industrial Edge Device functionality on demand and without the need of dedicated physical hardware devices.
Industrial Edge Own Device (IEOD) offers the Industrial Edge functionality and user experience on top of hardware by customer-choice.
Industrial Edge Virtual Device (IEVD) offers you the Industrial Edge Device functionality without the need of dedicated physical hardware devices.
SCALANCE LPE9000 (Local Processing Engine) extends the SCALANCE family portfolio by a component that provides computing power for a wide range of applications in the network, close to the process – Edge Computing.
SIMATIC HMI Panels are used for operator control and monitoring of machines and plants.
SIMATIC IPC Industrial Edge devices are industrial PCs that are pre-configured with the Industrial Edge Device software.
The devices of the SIMATIC IOT family offer a robust, compact and flexible solution with a
focus on the IOT environment and round off the SIMATIC IPC product range in the lower
output range.
This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory.
Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.
Vulnerability CVE-2025-40805
Affected devices do not properly enforce user authentication on specific API endpoints. This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user. Successful exploitation requires that the attacker has learned the identity of a legitimate user.
CWE-639: Authorization Bypass Through User-Controlled Key
ADDITIONAL INFORMATION
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT:
https://www.siemens.com/cert/advisories