Cyber Posture

CVE-2025-27395

High

Published: 11 March 2025

Published
11 March 2025
Modified
22 August 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0038 59.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.

Security Summary

CVE-2025-27395 is a path traversal vulnerability (CWE-22) affecting Siemens SCALANCE LPE9403 devices (order number 6GK5998-3GS00-2AC2) in all versions prior to V4.0. The flaw arises because these devices fail to properly restrict the scope of files accessible via the SFTP functionality and do not enforce appropriate privilege limitations. This issue has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and was published on March 11, 2025.

An authenticated attacker with high privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation enables the attacker to read and write arbitrary files on the affected device, potentially leading to full compromise including high impacts on confidentiality, integrity, and availability.

The Siemens product CERT advisory (SSA-075201) at https://cert-portal.siemens.com/productcert/html/ssa-075201.html provides details on mitigation, which includes updating to version V4.0 or later where available. Security practitioners should consult the advisory for full patch instructions and any workarounds for systems unable to update immediately.

Details

CWE(s)
CWE-22

Affected Products

siemens
scalance lpe9403 firmware
≤ 4.0

MITRE ATT&CK Enterprise Techniques

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

Path traversal in SFTP directly enables arbitrary local file reads (T1005) and writes, facilitating tool ingress (T1105) and stored data manipulation (T1565.001) on the device.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References