PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-32842 Siemens CVE debrief

CVE-2025-32842 is a high-severity SQL injection issue in Siemens TeleControl Server Basic. According to the CISA/Siemens advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and write the application database, and potentially execute code as NT AUTHORITY\NetworkService. Siemens and CISA list an update to V3.1.2.2 or later and restricting access to port 8000 as the primary mitigations.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

Organizations running Siemens TeleControl Server Basic, especially OT/ICS operators, Windows administrators, and security teams responsible for systems exposing port 8000 or allowing authenticated remote access.

Technical summary

The advisory states that the affected application is vulnerable to SQL injection through the internally used GetUsers method. The attack requires authenticated remote access and network reachability to port 8000. Impact includes authorization bypass, database read/write access, and possible code execution under the NetworkService account. The published CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, corresponding to a score of 8.8 (High).

Defensive priority

High. The issue is network-reachable, requires authentication, and can lead to privilege-relevant code execution plus full database compromise. Prioritize patching exposed or remotely accessible installations first.

Recommended defensive actions

  • Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
  • Restrict access to port 8000 on affected systems to trusted IP addresses only.
  • Audit deployments for any internet-facing or broadly reachable exposure of the service.
  • Review authentication and access logs for unusual requests against the application.
  • Apply general ICS defense-in-depth guidance from CISA for segmentation and access control.

Evidence notes

All substantive claims are taken from the supplied CISA CSAF advisory content and Siemens references. The vulnerability description, affected product, remediation guidance, and CVSS vector were provided in the source corpus. Timing context uses the supplied published date of 2025-04-16 and modified date of 2025-05-06; the latter is a revision for typos, not a new issue date.

Official resources

Published on 2025-04-16 and revised on 2025-05-06 for typo fixes, per the supplied advisory timeline.