PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-31349 Siemens CVE debrief

CVE-2025-31349 is a high-severity SQL injection issue in Siemens TeleControl Server Basic. According to the advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and modify the application database, and potentially execute code as NT AUTHORITY\NetworkService.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

Siemens TeleControl Server Basic administrators, OT/ICS operators, network defenders, and vulnerability management teams responsible for systems that expose port 8000 or otherwise accept remote access to the affected service.

Technical summary

The affected internally used UpdateSmtpSettings method is vulnerable to SQL injection. The published CVSS 3.1 vector is AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, reflecting a network-reachable attack that requires low privileges but no user interaction. CISA and Siemens state that successful exploitation can impact database confidentiality, integrity, and availability, and may lead to code execution under the NetworkService account.

Defensive priority

High. The issue is remotely reachable, requires only authenticated access, and can result in full database compromise and code execution if port 8000 is exposed to an attacker.

Recommended defensive actions

  • Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
  • Restrict access to port 8000 on affected systems to trusted IP addresses only.
  • Verify whether any vulnerable instances are reachable from untrusted networks and remove unnecessary exposure.
  • Review authentication, service, and database logs for suspicious requests or unauthorized changes.
  • If immediate patching is not possible, place the affected service behind strict network controls and limit administrative access.

Evidence notes

The primary evidence comes from CISA advisory ICSA-25-112-01 and Siemens advisory SSA-443402. Both describe SQL injection in the internally used UpdateSmtpSettings method, note the need for access to port 8000, and list remediation to update to V3.1.2.2 or later and restrict port 8000 to trusted IPs. The supplied record also includes the CVSS 3.1 vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H.

Official resources

Publicly disclosed on 2025-04-16 by CISA/Siemens; the supplied advisory metadata shows a 2025-05-06 revision that fixed typos.