PatchSiren cyber security CVE debrief
CVE-2025-32826 Siemens CVE debrief
CVE-2025-32826 is a high-severity SQL injection affecting Siemens TeleControl Server Basic. According to the advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and write the application's database, and potentially execute code as NT AUTHORITY\\NetworkService. Siemens recommends restricting access to port 8000 and upgrading to V3.1.2.2 or later.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Organizations running Siemens TeleControl Server Basic, especially any deployment exposed on port 8000 or reachable from untrusted networks. OT/ICS operators, Windows administrators, and teams responsible for asset inventory, firewall rules, and patch management should prioritize review.
Technical summary
The advisory describes SQL injection in the internally used GetActiveProjects method. The vulnerable path is reachable by an authenticated remote attacker with network access to port 8000. Impact includes authorization bypass, database read/write access, and code execution under the NT AUTHORITY\\NetworkService account. CISA lists the issue at CVSS 3.1 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Defensive priority
High. This is an exploitable network-reachable weakness with potential for database compromise and code execution. Prioritize if TeleControl Server Basic is deployed in production or exposed beyond a tightly controlled management network.
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Verify which hosts run TeleControl Server Basic and whether any instance is reachable from user, contractor, or Internet-facing networks.
- Review authentication, firewall, and segmentation controls around the TeleControl Server Basic service.
- Check for unexpected database activity or service behavior on vulnerable hosts until remediation is complete.
Evidence notes
The affected product, vulnerability mechanism, impact, and remediation are taken from the CISA CSAF advisory ICSA-25-112-01 and the linked Siemens product security advisory. The advisory was published on 2025-04-16 and later revised on 2025-05-06 for typo fixes only, per the supplied timeline. No exploit details beyond the advisory description are included.
Official resources
-
CVE-2025-32826 CVE record
CVE.org
-
CVE-2025-32826 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Public advisory disclosed by CISA and Siemens on 2025-04-16; the supplied record shows a later revision on 2025-05-06 for typo fixes only.