Overview
A critical vulnerability, CVE-2025-30175, has been identified in multiple versions of SIMATIC PCS neo, SINEC NMS, SINEMA Remote Connect, Totally Integrated Automation Portal (TIA Portal), and User Management Component (UMC). The vulnerability is of high concern due to the potential for system compromise or data leakage, and it could allow an unauthenticated remote attacker to cause a denial of service condition.
Vulnerability Summary
CVE ID: CVE-2025-30175
Severity: High (7.5 CVSS)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise and potential data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
SIMATIC PCS neo | V4.1, V5.0
SINEC NMS | All versions
SINEMA Remote Connect | All versions
TIA Portal | V17, V18, V19, V20
User Management Component (UMC) | All versions < V2.15.1.1
How the Exploit Works
The exploit takes advantage of an out of bounds write buffer overflow vulnerability in the integrated UMC component of the affected products. An unauthenticated, remote attacker could send specially crafted data to the targeted system, causing the system to write data beyond the boundaries of allocated memory buffers. This could lead to a denial of service condition or potentially allow the attacker to execute arbitrary code.
Conceptual Example Code
A conceptual example of the exploit might look like this:
POST /UMCcomponent/endpoint HTTP/1.1
Host: target.example.com
Content-Type: application/json
{ "buffer_overflow_payload": "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..." }
The “buffer_overflow_payload” in the example contains an unusually large amount of data, specifically designed to overflow the allocated memory buffer and exploit the vulnerability.

