PatchSiren cyber security CVE debrief
CVE-2025-27539 Siemens CVE debrief
CVE-2025-27539 is a critical SQL injection issue in Siemens TeleControl Server Basic. According to the CISA/Siemens advisory, an unauthenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization, read and write the application's database, and potentially execute code as NT AUTHORITY\NetworkService. The advisory was published on 2025-04-16 and later revised on 2025-05-06 for typo fixes.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Organizations operating Siemens TeleControl Server Basic, especially deployments with port 8000 reachable from untrusted networks. OT/ICS security teams, system owners, and administrators responsible for patching or network restriction should treat this as high priority.
Technical summary
The issue is described as SQL injection in the internally used VerifyUser method. The exposed attack path is network-based and requires no authentication. Impact includes authorization bypass, database read/write access, and code execution with NT AUTHORITY\NetworkService permissions. The affected product is Siemens TeleControl Server Basic, and the vendor remediation specifies updating to V3.1.2.2 or later; interim mitigation is to restrict access to port 8000 to trusted IP addresses.
Defensive priority
Critical. The CVSS 3.1 vector is 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), and the advisory describes unauthenticated remote impact with potential code execution. Prioritize patching or strict network access control immediately.
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Identify all TeleControl Server Basic deployments and confirm whether any are reachable from untrusted networks.
- Review segmentation and firewall rules around OT/ICS management interfaces exposed to port 8000.
- Validate remediation after patching and monitor for unexpected access attempts against the service.
Evidence notes
The supplied source corpus is a CISA CSAF advisory (ICSA-25-112-01) for CVE-2025-27539, referencing Siemens advisory SSA-443402. The advisory text states the VerifyUser SQL injection impact and the port 8000 access requirement. Publication date is 2025-04-16, with a revision on 2025-05-06 that only fixed typos. The supplied enrichment marks this as not a KEV-listed vulnerability.
Official resources
-
CVE-2025-27539 CVE record
CVE.org
-
CVE-2025-27539 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed through CISA ICS Advisory ICSA-25-112-01 on 2025-04-16, with a subsequent 2025-05-06 revision noted as typo fixes only.