Advisory

Multiple vulnerabilities in Siemens User Management Component affect industrial control systems

Take action: If you have Siemens User Management Component (UMC), limit access to TCP ports 4002 and 4004 only to necessary systems. Then where possible, plan a quick update to version 2.15.1.3. Be aware that SIMATIC PCS neo V4.1 and V5.0 systems can't be patched and should be isolated from untrusted networks.


Learn More

Siemens is reporting multiple security vulnerabilities in its User Management Component (UMC) that enable remote attackers to execute arbitrary code or cause denial-of-service conditions without authentication.

Vulnerabilities summary:

  • CVE-2025-40795 (CVSS score 9.3) - Stack-based Buffer Overflow that allows unauthenticated remote attackers to execute arbitrary code with full system privileges
  • CVE-2025-40796 (CVSS score 8.7) - Out-of-bounds Read
  • CVE-2025-40797 (CVSS score 8.7) - Out-of-bounds Read
  • CVE-2025-40798 (CVSS score 8.7) - Out-of-bounds Read 

The affected products include 

  • Siemens SIMATIC PCS neo V4.1 and V5.0 (all versions),
  • User Management Component versions prior to 2.15.1.3. 

Siemens has released UMC version 2.15.1.3, which addresses all four vulnerabilities. Organizations using standalone UMC installations should immediately update to this patched version. Pacthing for embedded implementations is complex as some affected product lines have gaps in vendor support. Siemens has indicated that no fixes are currently planned for SIMATIC PCS neo V4.1 and V5.0 systems.

For systems where immediate patching is not feasible, Siemens recommends blocking TCP ports 4002 and 4004 on machines with UMC installed in non-networked scenarios. Organizations not using 'RT Server' type UMC machines can block port 4004 entirely without impacting network functionality for other UMC machine types including Server, Ring-Server, and Agent configurations.

Multiple vulnerabilities in Siemens User Management Component affect industrial control systems