{"id":56061,"date":"2025-06-30T05:37:27","date_gmt":"2025-06-30T05:37:27","guid":{"rendered":""},"modified":"2025-07-08T05:20:34","modified_gmt":"2025-07-08T11:20:34","slug":"cve-2025-40574-critical-permissions-flaw-in-scalance-lpe9403","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-40574-critical-permissions-flaw-in-scalance-lpe9403\/","title":{"rendered":"<strong>CVE-2025-40574: Critical Permissions Flaw in SCALANCE LPE9403<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The SCALANCE LPE9403 manufactured by Siemens has been identified with a serious vulnerability, labelled as CVE-2025-40574. This flaw is found in all versions of the device and is a result of improper permissions assignment to critical resources. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49847-buffer-overflow-vulnerability-in-llama-cpp-leading-to-potential-code-execution\/\"  data-wpil-monitor-id=\"62779\">vulnerability could potentially<\/a> enable a non-privileged local attacker to interact with the backupmanager service, an integral part of the device&#8217;s system, leading to potential system compromise or data leakage. As the SCALANCE LPE9403 is a widely used device, this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4981-critical-file-extraction-vulnerability-in-mattermost-leading-to-potential-remote-code-execution\/\"  data-wpil-monitor-id=\"63096\">vulnerability has the potential<\/a> to affect a large number of users and cause significant damage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-40574<br \/>\nSeverity: High (CVSS 7.8)<br \/>\nAttack Vector: Local<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6370-critical-vulnerability-in-d-link-dir-619l-2-06b01-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"63538\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-402995220\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>SCALANCE LPE9403 (6GK5998-3GS00-2AC2) | All versions<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48274-critical-blind-sql-injection-vulnerability-in-wp-job-portal\/\"  data-wpil-monitor-id=\"62367\">vulnerability exploits the improper permissions assignment to critical<\/a> resources in the SCALANCE LPE9403 device. This flaw <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-29978-use-after-free-vulnerability-in-microsoft-office-powerpoint-allowing-unauthorized-local-code-execution\/\"  data-wpil-monitor-id=\"64882\">allows a non-privileged local<\/a> attacker to interact with the backupmanager service. Interaction with this service could <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6510-critical-vulnerability-in-netgear-ex6100-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"63681\">lead to manipulation of system<\/a> data, triggering unauthorized actions, or extraction of sensitive information. The exploit requires local access and user interaction, meaning the attacker needs to have physical access to the device or its network, and the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-34509-hardcoded-user-account-in-sitecore-xm-and-xp-enabling-unauthenticated-remote-access\/\"  data-wpil-monitor-id=\"62778\">user must perform some action to enable<\/a> the exploit.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3987603522\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>While the specifics of how this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49155-uncontrolled-search-path-vulnerability-in-trend-micro-apex-one-data-loss-prevention-module\/\"  data-wpil-monitor-id=\"62780\">vulnerability might be exploited are not publicly disclosed to prevent<\/a> misuse, a conceptual example of an attack might look like this:<\/p>\n<pre><code class=\"\" data-line=\"\"># Gain access to the system\n$ ssh user@target.example.com\n# Interact with the backupmanager service\n$ .\/backupmanager --command &quot;malicious_command&quot;<\/code><\/pre>\n<p>In this hypothetical example, the attacker gains access to the device via SSH and then directly interacts with the backupmanager service to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-44635-unauthorized-remote-command-execution-vulnerability-in-h3c-series-routers\/\"  data-wpil-monitor-id=\"63537\">execute a malicious command<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The SCALANCE LPE9403 manufactured by Siemens has been identified with a serious vulnerability, labelled as CVE-2025-40574. This flaw is found in all versions of the device and is a result of improper permissions assignment to critical resources. This vulnerability could potentially enable a non-privileged local attacker to interact with the backupmanager service, an integral [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-56061","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/56061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=56061"}],"version-history":[{"count":6,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/56061\/revisions"}],"predecessor-version":[{"id":58337,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/56061\/revisions\/58337"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=56061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=56061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=56061"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=56061"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=56061"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=56061"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=56061"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=56061"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=56061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}