PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-32836 Siemens CVE debrief

CVE-2025-32836 affects Siemens TeleControl Server Basic and is described by CISA as an SQL injection issue in the internally used GetConnectionVariables method. An authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and write the application database, and execute code as NT AUTHORITY\NetworkService.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

Siemens TeleControl Server Basic operators, OT/ICS administrators, and security teams responsible for systems that expose port 8000 should treat this as a priority exposure, especially where authenticated users can reach the service from untrusted networks.

Technical summary

The advisory states that the affected application is vulnerable to SQL injection through the internally used GetConnectionVariables method. Successful exploitation requires authenticated remote access and the ability to reach port 8000 on the target system. If exploited, the attacker may bypass authorization controls, read from and write to the application's database, and execute code with NT AUTHORITY\NetworkService permissions.

Defensive priority

High. The issue is network-reachable once authentication and port 8000 access are in place, and the stated impact includes authorization bypass, database compromise, and code execution.

Recommended defensive actions

  • Restrict access to port 8000 on affected systems to trusted IP addresses only, as recommended in the advisory.
  • Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
  • Review authentication and network segmentation so only intended administrators and services can reach the application.
  • Validate that exposed instances are not reachable from untrusted networks and monitor for unusual database activity or service behavior.

Evidence notes

All substantive claims in this debrief come from the supplied CISA CSAF advisory ICSA-25-112-01 and its cited Siemens advisory SSA-443402. The advisory was published on 2025-04-16 and revised on 2025-05-06 for typo fixes; no exploit steps, version ranges beyond the vendor fix, or additional impact claims are added here.

Official resources

Publicly disclosed in CISA ICS Advisory ICSA-25-112-01 on 2025-04-16, with a revision on 2025-05-06 that corrected typos. The advisory is based on Siemens TeleControl Server Basic advisory SSA-443402.