PatchSiren cyber security CVE debrief
CVE-2025-27540 Siemens CVE debrief
CVE-2025-27540 is a critical SQL injection issue in Siemens TeleControl Server Basic. According to the advisory, a remote unauthenticated attacker who can reach TCP port 8000 may bypass authorization controls, read and write the application database, and execute code as NT AUTHORITY\NetworkService. Siemens lists an update to V3.1.2.2 or later and access restriction for port 8000 as the primary mitigations.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
OT/ICS defenders, Siemens TeleControl Server Basic administrators, network/security teams protecting systems exposed on TCP/8000, and any organization running the affected product in a reachable network segment.
Technical summary
The vulnerability is described as SQL injection in the internally used Authenticate method. The impact stated in the advisory includes authorization bypass, database read/write access, and remote code execution with NT AUTHORITY\NetworkService permissions. The attack requires network access to port 8000 on a system running a vulnerable version of the application.
Defensive priority
Critical — prioritize immediate patching or, if patching is not yet possible, restrict exposure of TCP/8000 to trusted sources only.
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to TCP port 8000 on affected systems to trusted IP addresses only.
- Inventory all TeleControl Server Basic deployments and confirm whether any instances are reachable from untrusted networks.
- Review Siemens advisory guidance and CISA ICS recommended practices for additional hardening and network segmentation steps.
Evidence notes
Primary evidence comes from the CISA CSAF advisory ICSA-25-112-01 and Siemens product security notice SSA-443402. The supplied advisory text states the SQL injection location (Authenticate), the required network access condition (port 8000), the impact (authorization bypass, database access, and code execution as NT AUTHORITY\NetworkService), and the vendor remediation (V3.1.2.2 or later plus access restriction to port 8000).
Official resources
-
CVE-2025-27540 CVE record
CVE.org
-
CVE-2025-27540 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published the advisory and CVE record on 2025-04-16; the source advisory was revised on 2025-05-06 to fix typos. The CVE published and modified dates in the supplied timeline match that same publication and revision window.