First published: Tue Feb 11 2025(Updated: )
A vulnerability has been identified in SIMATIC IPC DiagBase (All versions), SIMATIC IPC DiagMonitor (All versions). The affected device do not properly restrict the user permission for the registry key. This could allow an authenticated attacker to load vulnerable drivers into the system leading to privilege escalation or bypassing endpoint protection and other security measures.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC IPC DiagBase Firmware | <= | |
siemens SIMATIC IPC DiagMonitor firmware | <= |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-23403 is classified as a high-severity vulnerability due to its potential impact on system integrity.
To remediate CVE-2025-23403, update the affected SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor software to the latest versions provided by Siemens.
CVE-2025-23403 affects all versions of SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor.
CVE-2025-23403 could allow authenticated attackers to load vulnerable drivers, leading to potential system exploitation.
No, proper restriction of user permissions for the registry key is essential to mitigate CVE-2025-23403, even for authenticated users.