PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-31351 Siemens CVE debrief

CVE-2025-31351 affects Siemens TeleControl Server Basic and was published on 2025-04-16. The advisory says an authenticated remote attacker who can reach port 8000 on a vulnerable system may abuse SQL injection in the internally used CreateProject method to bypass authorization, read and write the application database, and potentially execute code as NT AUTHORITY\NetworkService. Siemens lists an update to V3.1.2.2 or later, along with restricting port 8000 to trusted IPs, as the primary remediation path.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

Siemens TeleControl Server Basic administrators, OT/ICS operators, SOC and network teams, and incident responders should prioritize this issue, especially where port 8000 is reachable from untrusted networks.

Technical summary

The advisory describes a SQL injection flaw in the internally used CreateProject method. Attackers must be authenticated and able to access port 8000 on the affected host. The stated impact includes authorization bypass, database read/write access, and possible code execution with NT AUTHORITY\NetworkService permissions. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, scored 8.8 (HIGH).

Defensive priority

High

Recommended defensive actions

  • Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
  • Restrict access to port 8000 so only trusted IP addresses can reach the service.
  • Audit exposed TeleControl Server Basic instances to confirm version and network exposure.
  • Review logs and database activity for unexpected requests against the CreateProject workflow.
  • Treat exposed installations as high priority until patched, especially in OT environments.

Evidence notes

This debrief is based on the CISA CSAF advisory ICSA-25-112-01 for Siemens TeleControl Server Basic and the related Siemens advisory references. The source text explicitly states the SQL injection location, the authenticated remote attacker requirement, the port 8000 exposure condition, the potential impacts, and the vendor remediation to V3.1.2.2 or later. The supplied timeline shows publication on 2025-04-16 and a 2025-05-06 revision that only fixed typos.

Official resources

Public advisory published by CISA on 2025-04-16; the source advisory was revised on 2025-05-06 for typo fixes only. The supplied enrichment does not indicate a CISA KEV listing or known ransomware campaign use.