Overview
The SCALANCE LPE9403 manufactured by Siemens has been identified with a serious vulnerability, labelled as CVE-2025-40574. This flaw is found in all versions of the device and is a result of improper permissions assignment to critical resources. This vulnerability could potentially enable a non-privileged local attacker to interact with the backupmanager service, an integral part of the device’s system, leading to potential system compromise or data leakage. As the SCALANCE LPE9403 is a widely used device, this vulnerability has the potential to affect a large number of users and cause significant damage.
Vulnerability Summary
CVE ID: CVE-2025-40574
Severity: High (CVSS 7.8)
Attack Vector: Local
Privileges Required: None
User Interaction: Required
Impact: Potential system compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
SCALANCE LPE9403 (6GK5998-3GS00-2AC2) | All versions
How the Exploit Works
The vulnerability exploits the improper permissions assignment to critical resources in the SCALANCE LPE9403 device. This flaw allows a non-privileged local attacker to interact with the backupmanager service. Interaction with this service could lead to manipulation of system data, triggering unauthorized actions, or extraction of sensitive information. The exploit requires local access and user interaction, meaning the attacker needs to have physical access to the device or its network, and the user must perform some action to enable the exploit.
Conceptual Example Code
While the specifics of how this vulnerability might be exploited are not publicly disclosed to prevent misuse, a conceptual example of an attack might look like this:
# Gain access to the system
$ ssh user@target.example.com
# Interact with the backupmanager service
$ ./backupmanager --command "malicious_command"
In this hypothetical example, the attacker gains access to the device via SSH and then directly interacts with the backupmanager service to execute a malicious command.