PatchSiren cyber security CVE debrief
CVE-2025-32834 Siemens CVE debrief
CVE-2025-32834 is a high-severity SQL injection issue in Siemens TeleControl Server Basic, exposed through the internally used UpdateConnectionVariablesWithImport method. According to the public advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and write the application's database, and execute code as NT AUTHORITY\NetworkService. Siemens and CISA published remediation guidance recommending access restriction to port 8000 and an update to V3.1.2.2 or later.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Organizations running Siemens TeleControl Server Basic, especially OT/ICS operators, Windows system owners, and network/security teams responsible for exposure of port 8000 and authentication controls.
Technical summary
The advisory describes a SQL injection weakness in the internally used UpdateConnectionVariablesWithImport method of Siemens TeleControl Server Basic. The attack requires authenticated remote access and the ability to reach port 8000 on the affected host. Successful exploitation can bypass authorization controls, enable database read and write access, and lead to code execution with NT AUTHORITY\NetworkService permissions. The supplied remediation guidance is to restrict access to port 8000 to trusted IPs and update to V3.1.2.2 or later.
Defensive priority
High
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Verify that only required authenticated users can reach the service.
- Review logs and configuration for unexpected database changes or unauthorized access attempts.
- Apply standard ICS defense-in-depth guidance for exposed management and service ports.
Evidence notes
This debrief is based only on the supplied CISA CSAF advisory ICSA-25-112-01 and the referenced Siemens security advisory. The CVE was published on 2025-04-16 and the public record was revised on 2025-05-06 for typos only, per the provided timeline. The advisory explicitly states the affected product, attack prerequisites, impacts, and remediation version.
Official resources
-
CVE-2025-32834 CVE record
CVE.org
-
CVE-2025-32834 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Public advisory published on 2025-04-16 and revised on 2025-05-06 for typos only, based on the supplied timeline and advisory metadata.