A vulnerability has been identified in SIMATIC CN 4100 (All versions < V4.0.1). The affected application do not properly validate input parameters in its REST API, resulting in improper handling of unexpected arguments.
This could allow an authenticated attacker to execute arbitrary code with limited privileges.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/html/ssa-416652.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
10 Dec 2025, 21:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/html/ssa-416652.html - Vendor Advisory | |
| First Time |
Siemens
Siemens simatic Cn 4100 Firmware Siemens simatic Cn 4100 |
|
| CPE | cpe:2.3:o:siemens:simatic_cn_4100_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:simatic_cn_4100:-:*:*:*:*:*:*:* |
09 Dec 2025, 16:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 16:17
Updated : 2025-12-10 21:37
NVD link : CVE-2025-40937
Mitre link : CVE-2025-40937
CVE.ORG link : CVE-2025-40937
JSON object : View
Products Affected
siemens
- simatic_cn_4100
- simatic_cn_4100_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
