{"uuid": "c177be75-2d9f-4cb7-8af7-34a657e20a09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40569", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17901", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40569\n\ud83d\udd25 CVSS Score: 4.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions &lt; V3.2), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (All versions &lt; V3.2), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (All versions &lt; V3.2), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (All versions &lt; V3.2), SCALANCE XC332 (6GK5332-0GA00-2AC2) (All versions &lt; V3.2), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (All versions &lt; V3.2), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (All versions &lt; V3.2), SCALANCE XC432 (6GK5432-0GR00-2AC2) (All versions &lt; V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions &lt; V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions &lt; V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions &lt; V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions &lt; V3.2), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (All versions &lt; V3.2), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (All versions &lt; V3.2), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (All versions &lt; V3.2), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (All versions &lt; V3.2), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (All versions &lt; V3.2), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (All versions &lt; V3.2), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (All versions &lt; V3.2), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (All versions &lt; V3.2), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (All versions &lt; V3.2), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (All versions &lt; V3.2), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (All versions &lt; V3.2), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (All versions &lt; V3.2), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (All versions &lt; V3.2), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (All versions &lt; V3.2), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (All versions &lt; V3.2), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (All versions &lt; V3.2), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (All versions &lt; V3.2), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (All versions &lt; V3.2), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (All versions &lt; V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions &lt; V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions &lt; V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions &lt; V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions &lt; V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions &lt; V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions &lt; V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions &lt; V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions &lt; V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions &lt; V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions &lt; V3.2). The \"Load Configuration from Local PC\" functionality in the web interface of affected products contains a race condition vulnerability. This could allow an authenticated remote attacker to make the affected product load an attacker controlled configuration instead of the legitimate one. Successful exploitation requires that a legitimate administrator invokes the functionality and the attacker wins the race condition.\n\ud83d\udccf Published: 2025-06-10T15:17:33.607Z\n\ud83d\udccf Modified: 2025-06-10T15:17:33.607Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-693776.html", "creation_timestamp": "2025-06-10T15:30:59.000000Z"}