PatchSiren cyber security CVE debrief
CVE-2025-30030 Siemens CVE debrief
CVE-2025-30030 is a high-severity SQL injection issue in Siemens TeleControl Server Basic. According to the CISA/Siemens advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and write the application's database, and execute code as NT AUTHORITY\NetworkService. Siemens lists an update to version V3.1.2.2 or later and recommends restricting access to the service port as the immediate mitigation.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Organizations running Siemens TeleControl Server Basic, especially OT/ICS operators, administrators who expose or route traffic to port 8000, and defenders responsible for segmentation, access control, and patching of industrial systems.
Technical summary
The affected application is vulnerable through its internally used ImportDatabase method. The vulnerability is described as SQL injection with CVSS 3.1 vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The advisory states that exploitation requires authenticated remote access and connectivity to port 8000 on a system running a vulnerable version. Successful exploitation can lead to authorization bypass, database read/write access, and code execution under NT AUTHORITY\NetworkService.
Defensive priority
High: this is network-reachable, requires authentication but no user interaction, and can lead to full confidentiality, integrity, and availability impact plus code execution in an OT-adjacent product.
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Review any network exposure of the service and remove unnecessary reachability from untrusted networks.
- Apply standard ICS defense-in-depth and segmentation practices around the affected host and service.
- Validate that only authorized users can reach the application until remediation is complete.
Evidence notes
All claims are grounded in the supplied CISA CSAF advisory ICSA-25-112-01 and its linked Siemens advisory SSA-443402. The source explicitly states the SQL injection path, the authenticated remote attacker requirement, the port 8000 condition, the NetworkService execution context, and the remediation to V3.1.2.2 or later. The CVE was published on 2025-04-16 and modified on 2025-05-06; the modification note says it was a typo fix.
Official resources
-
CVE-2025-30030 CVE record
CVE.org
-
CVE-2025-30030 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed on 2025-04-16 in CISA ICS Advisory ICSA-25-112-01 and the linked Siemens advisory; the 2025-05-06 update is recorded as a revision for typo fixes.