PatchSiren cyber security CVE debrief
CVE-2025-29905 Siemens CVE debrief
CVE-2025-29905 is a high-severity SQL injection vulnerability affecting Siemens TeleControl Server Basic. According to the CISA/Siemens advisory corpus, an authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and modify the application's database, and execute code with NT AUTHORITY\NetworkService permissions. The advisory was published on 2025-04-16 and later revised on 2025-05-06 for typo fixes only.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Siemens TeleControl Server Basic operators, OT/ICS defenders, asset owners exposing port 8000, and vulnerability management teams responsible for Windows-based industrial server deployments.
Technical summary
The advisory describes SQL injection in the internally used RestoreFromBackup method. The stated attack prerequisites are authenticated access and network reachability to port 8000 on a system running a vulnerable version of TeleControl Server Basic. Impact includes authorization bypass, database read/write access, and code execution under NT AUTHORITY\NetworkService. The provided CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, matching a high-impact remote attack path with low complexity and low privileges required.
Defensive priority
High
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later, as listed in the vendor remediation guidance.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Review authentication boundaries and network segmentation around TeleControl Server Basic, especially any paths that allow remote access into the service.
- Use the Siemens and CISA advisories to confirm affected versions and remediation timing for your environment.
Evidence notes
Primary evidence comes from the CISA CSAF advisory ICSA-25-112-01 and the Siemens product security advisory referenced in the source corpus. The corpus identifies Siemens TeleControl Server Basic as the affected product and states that the issue is an SQL injection in the internal RestoreFromBackup method. The advisory text explicitly notes authenticated remote attack conditions, required access to port 8000, and potential execution as NT AUTHORITY\NetworkService. Published date: 2025-04-16; modified date: 2025-05-06, with the revision history indicating typo fixes only. No Known Exploited Vulnerabilities (KEV) entry is included in the supplied data.
Official resources
-
CVE-2025-29905 CVE record
CVE.org
-
CVE-2025-29905 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed through coordinated vendor and CISA advisory channels on 2025-04-16, with a later advisory revision on 2025-05-06 for typo fixes only.