PatchSiren cyber security CVE debrief
CVE-2025-31350 Siemens CVE debrief
CVE-2025-31350 is a high-severity SQL injection issue in Siemens TeleControl Server Basic. According to the CISA/Siemens advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and write the application's database, and execute code as NT AUTHORITY\NetworkService. Siemens and CISA published the advisory on 2025-04-16 and later revised it on 2025-05-06 for typo corrections.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Organizations running Siemens TeleControl Server Basic, especially OT/ICS environments exposing port 8000 to non-trusted networks, should treat this as a priority patching and exposure-reduction item. Security teams responsible for network segmentation, access control, and system hardening around industrial applications should also review it.
Technical summary
The advisory describes a SQL injection condition in the internally used UpdateBufferingSettings method. The issue affects Siemens TeleControl Server Basic and requires attacker access to port 8000 on a system running a vulnerable version. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, consistent with significant confidentiality, integrity, and availability impact once the prerequisite access is met. The vendor remediation is to update to V3.1.2.2 or later; Siemens also recommends restricting access to port 8000 to trusted IP addresses only.
Defensive priority
High
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Review network exposure and apply ICS defense-in-depth guidance to reduce reachability of the service.
Evidence notes
This debrief is based on the CISA CSAF advisory ICSA-25-112-01 and the Siemens product security advisory referenced in the source corpus. The source text states that the affected application is vulnerable to SQL injection through UpdateBufferingSettings, that exploitation requires authenticated access and reachability of port 8000, and that the fixed version is V3.1.2.2 or later. The advisory was published on 2025-04-16 and revised on 2025-05-06 for typo corrections only.
Official resources
-
CVE-2025-31350 CVE record
CVE.org
-
CVE-2025-31350 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Public disclosure occurred in the CISA ICS advisory and Siemens advisory on 2025-04-16, with a later source revision on 2025-05-06 that corrected typos only.