CVE-2025-40743 (GCVE-0-2025-40743)

Vulnerability from cvelistv5 – Published: 2025-08-12 11:17 – Updated: 2025-08-13 20:18
VLAI?
Summary
A vulnerability has been identified in SINUMERIK 828D PPU.4 (All versions < V4.95 SP5), SINUMERIK 828D PPU.5 (All versions < V5.25 SP1), SINUMERIK 840D sl (All versions < V4.95 SP5), SINUMERIK MC (All versions < V1.25 SP1), SINUMERIK MC V1.15 (All versions < V1.15 SP5), SINUMERIK ONE (All versions < V6.25 SP1), SINUMERIK ONE V6.15 (All versions < V6.15 SP5). The affected application improperly validates authentication for its VNC access service, allowing access with insufficient password verification. This could allow an attacker to gain unauthorized remote access and potentially compromise system confidentiality, integrity, or availability.
CWE
  • CWE-288 - Authentication Bypass Using an Alternate Path or Channel
Assigner
Impacted products
Vendor Product Version
Siemens SINUMERIK 828D PPU.4 Affected: 0 , < V4.95 SP5 (custom)
Create a notification for this product.
    Siemens SINUMERIK 828D PPU.5 Affected: 0 , < V5.25 SP1 (custom)
Create a notification for this product.
    Siemens SINUMERIK 840D sl Affected: 0 , < V4.95 SP5 (custom)
Create a notification for this product.
    Siemens SINUMERIK MC Affected: 0 , < V1.25 SP1 (custom)
Create a notification for this product.
    Siemens SINUMERIK MC V1.15 Affected: 0 , < V1.15 SP5 (custom)
Create a notification for this product.
    Siemens SINUMERIK ONE Affected: 0 , < V6.25 SP1 (custom)
Create a notification for this product.
    Siemens SINUMERIK ONE V6.15 Affected: 0 , < V6.15 SP5 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-40743",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-12T13:31:42.534312Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-13T20:18:49.085Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "SINUMERIK 828D PPU.4",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V4.95 SP5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "SINUMERIK 828D PPU.5",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.25 SP1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "SINUMERIK 840D sl",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V4.95 SP5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "SINUMERIK MC",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V1.25 SP1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "SINUMERIK MC V1.15",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V1.15 SP5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "SINUMERIK ONE",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V6.25 SP1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "SINUMERIK ONE V6.15",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V6.15 SP5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been identified in SINUMERIK 828D PPU.4 (All versions \u003c V4.95 SP5), SINUMERIK 828D PPU.5 (All versions \u003c V5.25 SP1), SINUMERIK 840D sl (All versions \u003c V4.95 SP5), SINUMERIK MC (All versions \u003c V1.25 SP1), SINUMERIK MC V1.15 (All versions \u003c V1.15 SP5), SINUMERIK ONE (All versions \u003c V6.25 SP1), SINUMERIK ONE V6.15 (All versions \u003c V6.15 SP5). The affected application improperly validates authentication for its VNC access service, allowing access with insufficient password verification.\r\nThis could allow an attacker to gain unauthorized remote access and potentially compromise system confidentiality, integrity, or availability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV4_0": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-288",
              "description": "CWE-288: Authentication Bypass Using an Alternate Path or Channel",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-12T11:17:03.997Z",
        "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
        "shortName": "siemens"
      },
      "references": [
        {
          "url": "https://cert-portal.siemens.com/productcert/html/ssa-177847.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
    "assignerShortName": "siemens",
    "cveId": "CVE-2025-40743",
    "datePublished": "2025-08-12T11:17:03.997Z",
    "dateReserved": "2025-04-16T08:39:30.030Z",
    "dateUpdated": "2025-08-13T20:18:49.085Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-40743\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2025-08-12T12:15:35.803\",\"lastModified\":\"2025-08-12T14:25:33.177\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in SINUMERIK 828D PPU.4 (All versions \u003c V4.95 SP5), SINUMERIK 828D PPU.5 (All versions \u003c V5.25 SP1), SINUMERIK 840D sl (All versions \u003c V4.95 SP5), SINUMERIK MC (All versions \u003c V1.25 SP1), SINUMERIK MC V1.15 (All versions \u003c V1.15 SP5), SINUMERIK ONE (All versions \u003c V6.25 SP1), SINUMERIK ONE V6.15 (All versions \u003c V6.15 SP5). The affected application improperly validates authentication for its VNC access service, allowing access with insufficient password verification.\\r\\nThis could allow an attacker to gain unauthorized remote access and potentially compromise system confidentiality, integrity, or availability.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en SINUMERIK 828D PPU.4 (todas las versiones anteriores a V4.95 SP5), SINUMERIK 828D PPU.5 (todas las versiones anteriores a V5.25 SP1), SINUMERIK 840D sl (todas las versiones anteriores a V4.95 SP5), SINUMERIK MC (todas las versiones anteriores a V1.25 SP1), SINUMERIK MC V1.15 (todas las versiones anteriores a V1.15 SP5), SINUMERIK ONE (todas las versiones anteriores a V6.25 SP1) y SINUMERIK ONE V6.15 (todas las versiones anteriores a V6.15 SP5). La aplicaci\u00f3n afectada valida incorrectamente la autenticaci\u00f3n para su servicio de acceso VNC, lo que permite el acceso sin verificaci\u00f3n de contrase\u00f1a suficiente. Esto podr\u00eda permitir que un atacante obtenga acceso remoto no autorizado y potencialmente comprometer la confidencialidad, integridad o disponibilidad del sistema.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":5.5}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-288\"}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-177847.html\",\"source\":\"productcert@siemens.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-40743\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-12T13:31:42.534312Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-12T13:31:43.846Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 8.3, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\"}}, {\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 8.7, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N\"}}], \"affected\": [{\"vendor\": \"Siemens\", \"product\": \"SINUMERIK 828D PPU.4\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V4.95 SP5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"SINUMERIK 828D PPU.5\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.25 SP1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"SINUMERIK 840D sl\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V4.95 SP5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"SINUMERIK MC\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V1.25 SP1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"SINUMERIK MC V1.15\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V1.15 SP5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"SINUMERIK ONE\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V6.25 SP1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"SINUMERIK ONE V6.15\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V6.15 SP5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://cert-portal.siemens.com/productcert/html/ssa-177847.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability has been identified in SINUMERIK 828D PPU.4 (All versions \u003c V4.95 SP5), SINUMERIK 828D PPU.5 (All versions \u003c V5.25 SP1), SINUMERIK 840D sl (All versions \u003c V4.95 SP5), SINUMERIK MC (All versions \u003c V1.25 SP1), SINUMERIK MC V1.15 (All versions \u003c V1.15 SP5), SINUMERIK ONE (All versions \u003c V6.25 SP1), SINUMERIK ONE V6.15 (All versions \u003c V6.15 SP5). The affected application improperly validates authentication for its VNC access service, allowing access with insufficient password verification.\\r\\nThis could allow an attacker to gain unauthorized remote access and potentially compromise system confidentiality, integrity, or availability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-288\", \"description\": \"CWE-288: Authentication Bypass Using an Alternate Path or Channel\"}]}], \"providerMetadata\": {\"orgId\": \"cec7a2ec-15b4-4faf-bd53-b40f371f3a77\", \"shortName\": \"siemens\", \"dateUpdated\": \"2025-08-12T11:17:03.997Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-40743\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-13T20:18:49.085Z\", \"dateReserved\": \"2025-04-16T08:39:30.030Z\", \"assignerOrgId\": \"cec7a2ec-15b4-4faf-bd53-b40f371f3a77\", \"datePublished\": \"2025-08-12T11:17:03.997Z\", \"assignerShortName\": \"siemens\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…