PatchSiren cyber security CVE debrief
CVE-2025-32836 Siemens CVE debrief
CVE-2025-32836 affects Siemens TeleControl Server Basic and is described by CISA as an SQL injection issue in the internally used GetConnectionVariables method. An authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and write the application database, and execute code as NT AUTHORITY\NetworkService.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Siemens TeleControl Server Basic operators, OT/ICS administrators, and security teams responsible for systems that expose port 8000 should treat this as a priority exposure, especially where authenticated users can reach the service from untrusted networks.
Technical summary
The advisory states that the affected application is vulnerable to SQL injection through the internally used GetConnectionVariables method. Successful exploitation requires authenticated remote access and the ability to reach port 8000 on the target system. If exploited, the attacker may bypass authorization controls, read from and write to the application's database, and execute code with NT AUTHORITY\NetworkService permissions.
Defensive priority
High. The issue is network-reachable once authentication and port 8000 access are in place, and the stated impact includes authorization bypass, database compromise, and code execution.
Recommended defensive actions
- Restrict access to port 8000 on affected systems to trusted IP addresses only, as recommended in the advisory.
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Review authentication and network segmentation so only intended administrators and services can reach the application.
- Validate that exposed instances are not reachable from untrusted networks and monitor for unusual database activity or service behavior.
Evidence notes
All substantive claims in this debrief come from the supplied CISA CSAF advisory ICSA-25-112-01 and its cited Siemens advisory SSA-443402. The advisory was published on 2025-04-16 and revised on 2025-05-06 for typo fixes; no exploit steps, version ranges beyond the vendor fix, or additional impact claims are added here.
Official resources
-
CVE-2025-32836 CVE record
CVE.org
-
CVE-2025-32836 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in CISA ICS Advisory ICSA-25-112-01 on 2025-04-16, with a revision on 2025-05-06 that corrected typos. The advisory is based on Siemens TeleControl Server Basic advisory SSA-443402.