CVE-2025-40735
Published: 08 July 2025
Summary
CVE-2025-40735 is a high-severity SQL Injection (CWE-89) vulnerability in Siemens Sinec Nms. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection vulnerabilities like CVE-2025-40735 by validating and sanitizing all user inputs before database processing.
Requires timely patching and remediation of the specific SQL injection flaw in SINEC NMS versions prior to V4.0 as per vendor advisory.
Mandates vulnerability scanning to identify and remediate SQL injection issues like CVE-2025-40735 before exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct SQL injection in a network-accessible management application enables remote exploitation of a public-facing service (T1190).
NVD Description
A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affected devices are vulnerable to SQL injection. This could allow an unauthenticated remote attacker to execute arbitrary SQL queries on the server database.
Deeper analysisAI
CVE-2025-40735 is a SQL injection vulnerability affecting SINEC NMS in all versions prior to V4.0. The flaw allows execution of arbitrary SQL queries on the server database, as identified under CWE-89. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity with network accessibility, low attack complexity, and potential for high impacts on confidentiality, integrity, and availability. The vulnerability was published on 2025-07-08.
An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary SQL queries against the affected devices. While the CVSS vector specifies low privileges required (PR:L), the description emphasizes unauthenticated remote access, enabling attackers with network reach to the SINEC NMS instance to manipulate the database, potentially extracting sensitive data, modifying records, or disrupting services.
For mitigation guidance, refer to the Siemens product CERT advisory at https://cert-portal.siemens.com/productcert/html/ssa-078892.html, which provides details on patches and remediation steps.
Details
- CWE(s)