CVE-2025-27392
Published: 11 March 2025
Description
Adversaries may abuse Unix shell commands and scripts for execution.
Security Summary
CVE-2025-27392 affects Siemens SCALANCE LPE9403 (6GK5998-3GS00-2AC2) in all versions prior to V4.0. The vulnerability arises from improper sanitization of user input when creating new VXLAN configurations, classified under CWE-78 (OS Command Injection). It carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-03-11.
An authenticated remote attacker with high privileges can exploit this vulnerability over the network with low attack complexity and no user interaction. Exploitation enables arbitrary code execution on the affected device, resulting in high impacts to confidentiality, integrity, and availability.
Siemens Security Advisory SSA-075201, available at https://cert-portal.siemens.com/productcert/html/ssa-075201.html, provides details on the vulnerability and recommended mitigations.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
OS command injection (CWE-78) in the authenticated management interface enables remote code execution on the network device, directly mapping to T1190 (exploiting public-facing app) and T1059.004 (Unix Shell for arbitrary command execution).