PatchSiren cyber security CVE debrief
CVE-2025-32830 Siemens CVE debrief
CVE-2025-32830 is a high-severity SQL injection issue in Siemens TeleControl Server Basic. According to the CISA CSAF advisory, the flaw is reachable through the internally used UnlockProject method and can let an authenticated remote attacker bypass authorization controls, read and write the application's database, and execute code as NT AUTHORITY\NetworkService when the vulnerable service is reachable on port 8000.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Operators and defenders responsible for Siemens TeleControl Server Basic, especially OT/ICS environments where port 8000 is reachable. Security teams should also pay attention if the product is deployed on Windows systems with broad network access or if authenticated remote users can reach the service.
Technical summary
The advisory describes a SQL injection condition in the internally used UnlockProject method of TeleControl Server Basic. The impact includes authorization bypass, database read/write access, and code execution with NT AUTHORITY\NetworkService permissions. Exploitation requires authenticated remote access and the ability to reach port 8000 on a host running a vulnerable version. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, which aligns with a high-severity remote attack path.
Defensive priority
High
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Verify whether any vulnerable instance is reachable from untrusted networks or remote user segments and remove unnecessary exposure.
- Review affected systems for unexpected database changes or signs of unauthorized authenticated activity if exposure existed.
- Follow Siemens and CISA ICS defense-in-depth and recommended practices guidance for industrial control system environments.
Evidence notes
All substantive claims here come from the supplied CISA CSAF advisory for ICSA-25-112-01 and its referenced Siemens advisory materials. The advisory text explicitly identifies the UnlockProject SQL injection, the authenticated remote attack requirement, the need to access port 8000, the authorization-bypass and code-execution impacts, and the recommended fix to V3.1.2.2 or later. The revision history shows a 2025-05-06 update marked as typo fixes only.
Official resources
-
CVE-2025-32830 CVE record
CVE.org
-
CVE-2025-32830 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed on 2025-04-16. The supplied source advisory was revised on 2025-05-06, with the revision history indicating typo fixes only. No KEV listing is present in the supplied data.