PatchSiren cyber security CVE debrief
CVE-2025-32829 Siemens CVE debrief
CVE-2025-32829 is a high-severity SQL injection issue in Siemens TeleControl Server Basic. The advisory states that an authenticated remote attacker who can reach port 8000 on a vulnerable system may abuse the internally used LockProjectCrossCommunications method to bypass authorization controls, read and write the application database, and potentially execute code as NT AUTHORITY\NetworkService.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Operators and defenders responsible for Siemens TeleControl Server Basic deployments, especially environments where the service is reachable on port 8000 or exposed beyond trusted network boundaries.
Technical summary
According to the CISA CSAF advisory and Siemens references, the vulnerability is an SQL injection flaw in the internally used LockProjectCrossCommunications method. The stated attack prerequisites are network access to port 8000 and authenticated access. Successful exploitation may permit authorization bypass, database read/write access, and code execution with NT AUTHORITY\NetworkService permissions. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, matching the 8.8 HIGH score in the source corpus.
Defensive priority
High. Prioritize systems where TeleControl Server Basic is deployed and where port 8000 is reachable from untrusted or broadly trusted networks. Apply the vendor fix first, then reduce exposure.
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later, as specified in the Siemens remediation guidance.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Review network segmentation and service exposure for any TeleControl Server Basic instance that may be reachable by non-admin or non-trusted hosts.
- Follow Siemens and CISA industrial control system defense-in-depth guidance for layered protections around OT-facing services.
Evidence notes
This debrief is based only on the supplied CISA CSAF source item for ICSA-25-112-01 and the Siemens advisory references listed in that source. The issue was published on 2025-04-16 and revised on 2025-05-06; the revision history provided says the later update fixed typos only. No KEV entry was supplied in the corpus.
Official resources
-
CVE-2025-32829 CVE record
CVE.org
-
CVE-2025-32829 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CVE-2025-32829 was publicly disclosed on 2025-04-16 in CISA advisory ICSA-25-112-01. The source record was modified on 2025-05-06 for typos only.