PatchSiren cyber security CVE debrief
CVE-2025-32842 Siemens CVE debrief
CVE-2025-32842 is a high-severity SQL injection issue in Siemens TeleControl Server Basic. According to the CISA/Siemens advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and write the application database, and potentially execute code as NT AUTHORITY\NetworkService. Siemens and CISA list an update to V3.1.2.2 or later and restricting access to port 8000 as the primary mitigations.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Organizations running Siemens TeleControl Server Basic, especially OT/ICS operators, Windows administrators, and security teams responsible for systems exposing port 8000 or allowing authenticated remote access.
Technical summary
The advisory states that the affected application is vulnerable to SQL injection through the internally used GetUsers method. The attack requires authenticated remote access and network reachability to port 8000. Impact includes authorization bypass, database read/write access, and possible code execution under the NetworkService account. The published CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, corresponding to a score of 8.8 (High).
Defensive priority
High. The issue is network-reachable, requires authentication, and can lead to privilege-relevant code execution plus full database compromise. Prioritize patching exposed or remotely accessible installations first.
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Audit deployments for any internet-facing or broadly reachable exposure of the service.
- Review authentication and access logs for unusual requests against the application.
- Apply general ICS defense-in-depth guidance from CISA for segmentation and access control.
Evidence notes
All substantive claims are taken from the supplied CISA CSAF advisory content and Siemens references. The vulnerability description, affected product, remediation guidance, and CVSS vector were provided in the source corpus. Timing context uses the supplied published date of 2025-04-16 and modified date of 2025-05-06; the latter is a revision for typos, not a new issue date.
Official resources
-
CVE-2025-32842 CVE record
CVE.org
-
CVE-2025-32842 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Published on 2025-04-16 and revised on 2025-05-06 for typo fixes, per the supplied advisory timeline.