PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-32835 Siemens CVE debrief

CVE-2025-32835 is a high-severity SQL injection issue in Siemens TeleControl Server Basic, exposed through the internally used UpdateConnectionVariableArchivingBuffering method. According to the advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable host may bypass authorization controls, read and write the application's database, and execute code as NT AUTHORITY\NetworkService. Siemens and CISA published the advisory on 2025-04-16 and later issued a revision on 2025-05-06 for typo fixes.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

OT/ICS administrators, Siemens TeleControl Server Basic operators, defenders responsible for host-based and network segmentation controls, and teams managing authenticated access to systems that expose port 8000.

Technical summary

The supplied advisory describes a SQL injection weakness in the internal UpdateConnectionVariableArchivingBuffering method of Siemens TeleControl Server Basic. The stated impact includes authorization bypass, database read/write access, and code execution with NT AUTHORITY\NetworkService permissions. The attack requires authenticated access and network reachability to port 8000 on a system running a vulnerable version.

Defensive priority

High priority. The combination of authenticated remote access, database compromise, and code execution potential warrants rapid remediation, especially where port 8000 is exposed beyond trusted administrative networks.

Recommended defensive actions

  • Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
  • Restrict access to port 8000 on affected systems to trusted IP addresses only.
  • Audit exposed systems for unexpected authentication attempts, database changes, or service activity tied to TeleControl Server Basic.
  • Apply ICS network segmentation and defense-in-depth practices to reduce exposure of management services.

Evidence notes

This debrief is based on the CISA CSAF advisory ICSA-25-112-01 (source item) and the Siemens security advisory SSA-443402 referenced in the provided corpus. The advisory text explicitly states the SQL injection condition, the need for authenticated remote access, the port 8000 prerequisite, and the NT AUTHORITY\NetworkService execution context. The 2025-05-06 modification in the supplied timeline is recorded as typo fixes, not a substantive change in the vulnerability description.

Official resources

Publicly disclosed on 2025-04-16 in CISA advisory ICSA-25-112-01 / Siemens advisory SSA-443402; revised on 2025-05-06 for typo fixes.