Privilege escalation in Siemens SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-23403
CWE-ID CWE-732
Exploitation vector Local
Public exploit N/A
Vulnerable software
SIMATIC IPC DiagBase
Server applications / SCADA systems

SIMATIC IPC DiagMonitor
Server applications / SCADA systems

Vendor Siemens

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Incorrect permission assignment for critical resource

EUVDB-ID: #VU103910

Risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23403

CWE-ID: CWE-732 - Incorrect Permission Assignment for Critical Resource

Exploit availability: No

Description

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to the affected device do not properly restrict the user permission for the registry key. A local user can load vulnerable drivers into the system and gain elevated privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SIMATIC IPC DiagBase: All versions

SIMATIC IPC DiagMonitor: All versions

CPE2.3 External links

http://cert-portal.siemens.com/productcert/html/ssa-369369.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###