Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-40566

CVE-2025-40566: Siemens Simatic PCS Neo Auth Bypass Flaw

CVE-2025-40566 is an authentication bypass vulnerability in Siemens Simatic PCS Neo that allows attackers to reuse session tokens after logout. This article covers technical details, affected versions, and mitigation.

Published: March 11, 2026

CVE-2025-40566 Overview

A session management vulnerability has been identified in Siemens SIMATIC PCS neo, an industrial process control system. The affected products fail to correctly invalidate user sessions upon logout, creating a window of opportunity for session hijacking attacks. A remote unauthenticated attacker who has obtained a valid session token through other means (such as network interception, XSS attacks, or compromised client devices) can re-use a legitimate user's session even after that user has logged out of the system.

This vulnerability poses significant risks in industrial control system (ICS) environments where SIMATIC PCS neo is deployed for process automation and control. Unauthorized session reuse could grant attackers full access to process control interfaces, potentially enabling manipulation of industrial processes, unauthorized configuration changes, or data exfiltration.

Critical Impact

Remote attackers can hijack previously authenticated sessions to gain unauthorized access to industrial control systems, potentially compromising process integrity and safety.

Affected Products

  • SIMATIC PCS neo V4.1 (All versions prior to V4.1 Update 3)
  • SIMATIC PCS neo V5.0 (All versions prior to V5.0 Update 1)
  • SIMATIC PCS neo V4.1 Update 1
  • SIMATIC PCS neo V4.1 Update 2

Discovery Timeline

  • May 13, 2025 - CVE-2025-40566 published to NVD
  • August 22, 2025 - Last updated in NVD database

Technical Details for CVE-2025-40566

Vulnerability Analysis

This vulnerability is classified as CWE-613 (Insufficient Session Expiration), a common web application security weakness where session tokens remain valid after a user has explicitly logged out. In properly implemented session management, the logout operation should invalidate the session token on the server side, rendering it unusable for subsequent authentication attempts.

The flaw in SIMATIC PCS neo allows an attacker to exploit session tokens that should have been invalidated. When a legitimate user logs out, the session token associated with their authenticated session is not properly destroyed or marked as invalid on the server. This creates a race condition where stolen or captured session tokens remain functional indefinitely or until they reach their natural expiration time.

The network-based attack vector means this vulnerability can be exploited remotely without requiring local access to the target system. The attack does require some user interaction—specifically, the user must first establish a valid authenticated session that the attacker can then hijack.

Root Cause

The root cause lies in the session management implementation within SIMATIC PCS neo's web interface. Upon user logout, the application fails to properly invalidate the session token on the server side. This implementation oversight means that session tokens persist in an active state beyond their intended lifecycle, violating the principle of least privilege and creating unnecessary attack surface.

Proper session invalidation should include server-side token destruction, removal from session stores, and optionally, token blacklisting to prevent replay attacks during any grace period.

Attack Vector

The attack requires an adversary to first obtain a valid session token belonging to a legitimate user. Common methods for obtaining session tokens include:

Network-based interception - If communications are not properly encrypted or if the attacker has positioned themselves in a man-in-the-middle scenario, session tokens transmitted over the network can be captured.

Cross-site scripting attacks - If XSS vulnerabilities exist in the application or related systems, attackers can inject scripts to exfiltrate session cookies.

Compromised client systems - Malware on user workstations can harvest session tokens from browser storage or memory.

Once a token is obtained, the attacker simply waits for the legitimate user to log out (believing their session is terminated) and then uses the captured token to impersonate the user. The session remains valid despite the logout action, granting the attacker the same privileges the legitimate user possessed.

Detection Methods for CVE-2025-40566

Indicators of Compromise

  • Session tokens being used after the associated user has logged out (correlation of logout events with subsequent authenticated requests using the same token)
  • Multiple concurrent sessions using identical session tokens from different IP addresses or geographic locations
  • Authenticated requests originating from unusual IP addresses or during unexpected time periods for known user accounts
  • Session activity continuing beyond normal business hours or from unexpected network segments

Detection Strategies

  • Implement session monitoring to correlate logout events with subsequent token usage
  • Deploy network monitoring to identify session tokens being transmitted from multiple source IPs
  • Enable detailed authentication logging that captures session token identifiers alongside user actions
  • Utilize SIEM rules to alert on session anomalies such as simultaneous use from disparate locations

Monitoring Recommendations

  • Monitor SIMATIC PCS neo authentication logs for signs of session reuse after logout events
  • Track and alert on session token activity patterns that indicate potential hijacking
  • Implement network intrusion detection rules for anomalous session behavior in the PCS neo environment
  • Establish baseline user session patterns to detect deviations indicative of account compromise

How to Mitigate CVE-2025-40566

Immediate Actions Required

  • Upgrade SIMATIC PCS neo V4.1 to Update 3 or later
  • Upgrade SIMATIC PCS neo V5.0 to Update 1 or later
  • Review network segmentation to limit exposure of SIMATIC PCS neo interfaces
  • Implement additional network-level authentication controls as a defense-in-depth measure
  • Audit active sessions and force re-authentication for all users after applying patches

Patch Information

Siemens has released security updates addressing this vulnerability. Detailed patch information and download links are available in the Siemens Security Advisory SSA-339086. Organizations should prioritize deployment of the following updates:

  • SIMATIC PCS neo V4.1: Update to V4.1 Update 3 or later
  • SIMATIC PCS neo V5.0: Update to V5.0 Update 1 or later

Workarounds

  • Implement network segmentation to restrict access to SIMATIC PCS neo web interfaces from trusted networks only
  • Use VPN or jump hosts to access PCS neo interfaces, reducing exposure of session tokens on untrusted networks
  • Configure shorter session timeout values to reduce the window of opportunity for session reuse
  • Deploy web application firewalls (WAF) with session monitoring capabilities to detect anomalous session behavior
  • Implement multi-factor authentication where supported to add additional verification beyond session tokens

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechSiemens Simatic Pcs Neo

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.21%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-613
  • Vendor Resources
  • Siemens Security Advisory SSA-339086
  • Related CVEs
  • CVE-2025-40797: Siemens Simatic PCS Neo DoS Vulnerability

  • CVE-2025-40795: Siemens Simatic PCS Neo Buffer Overflow
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English