PatchSiren cyber security CVE debrief
CVE-2025-32840 Siemens CVE debrief
CVE-2025-32840 is a high-severity SQL injection issue in Siemens TeleControl Server Basic. According to the CISA/Siemens advisory, an authenticated remote attacker who can reach port 8000 on a system running a vulnerable version may bypass authorization controls, read from and write to the application's database, and potentially execute code with NT AUTHORITY\NetworkService permissions. Siemens and CISA list vendor remediation to update to V3.1.2.2 or later and recommend restricting access to the exposed service port as an immediate mitigation.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
OT/ICS defenders, Siemens TeleControl Server Basic administrators, network security teams that can control access to TCP port 8000, and incident responders supporting Windows-based industrial systems.
Technical summary
The advisory describes SQL injection in the internally used LockGateway method of Siemens TeleControl Server Basic. The attack requires authenticated access and network reachability to port 8000 on the target system. Successful exploitation can lead to authorization bypass, database read/write access, and code execution under NT AUTHORITY\NetworkService. The CVSS vector supplied in the advisory is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, with a score of 8.8 (High).
Defensive priority
High. Prioritize remediation on any exposed TeleControl Server Basic instance, especially systems where TCP port 8000 is reachable from networks beyond a tightly controlled trust boundary.
Recommended defensive actions
- Upgrade Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to TCP port 8000 on affected systems to trusted IP addresses only.
- Verify whether any TeleControl Server Basic deployments are exposed beyond intended administrative or OT management networks.
- Review authentication and access-control logs for unusual activity against the affected service, especially on systems reachable on port 8000.
- Apply CISA and Siemens industrial control system defense-in-depth guidance to reduce service exposure and limit lateral movement risk.
Evidence notes
This debrief is based on the CISA CSAF advisory ICSA-25-112-01 and Siemens product security references included in the source corpus. The source text explicitly identifies the affected product, the LockGateway SQL injection condition, the port 8000 access requirement, the possible impacts, and the vendor-fixed version. The advisory was published on 2025-04-16 and revised on 2025-05-06 for typo fixes only.
Official resources
-
CVE-2025-32840 CVE record
CVE.org
-
CVE-2025-32840 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in the CISA ICS advisory ICSA-25-112-01 on 2025-04-16; the advisory was revised on 2025-05-06 for typo fixes. The CVE record and source advisory share the same publication date.