PatchSiren cyber security CVE debrief
CVE-2025-31351 Siemens CVE debrief
CVE-2025-31351 affects Siemens TeleControl Server Basic and was published on 2025-04-16. The advisory says an authenticated remote attacker who can reach port 8000 on a vulnerable system may abuse SQL injection in the internally used CreateProject method to bypass authorization, read and write the application database, and potentially execute code as NT AUTHORITY\NetworkService. Siemens lists an update to V3.1.2.2 or later, along with restricting port 8000 to trusted IPs, as the primary remediation path.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Siemens TeleControl Server Basic administrators, OT/ICS operators, SOC and network teams, and incident responders should prioritize this issue, especially where port 8000 is reachable from untrusted networks.
Technical summary
The advisory describes a SQL injection flaw in the internally used CreateProject method. Attackers must be authenticated and able to access port 8000 on the affected host. The stated impact includes authorization bypass, database read/write access, and possible code execution with NT AUTHORITY\NetworkService permissions. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, scored 8.8 (HIGH).
Defensive priority
High
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 so only trusted IP addresses can reach the service.
- Audit exposed TeleControl Server Basic instances to confirm version and network exposure.
- Review logs and database activity for unexpected requests against the CreateProject workflow.
- Treat exposed installations as high priority until patched, especially in OT environments.
Evidence notes
This debrief is based on the CISA CSAF advisory ICSA-25-112-01 for Siemens TeleControl Server Basic and the related Siemens advisory references. The source text explicitly states the SQL injection location, the authenticated remote attacker requirement, the port 8000 exposure condition, the potential impacts, and the vendor remediation to V3.1.2.2 or later. The supplied timeline shows publication on 2025-04-16 and a 2025-05-06 revision that only fixed typos.
Official resources
-
CVE-2025-31351 CVE record
CVE.org
-
CVE-2025-31351 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Public advisory published by CISA on 2025-04-16; the source advisory was revised on 2025-05-06 for typo fixes only. The supplied enrichment does not indicate a CISA KEV listing or known ransomware campaign use.