PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-32844 Siemens CVE debrief

CVE-2025-32844 is a high-severity SQL injection issue in Siemens TeleControl Server Basic. According to the CISA/Siemens advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and write the application database, and execute code with NT AUTHORITY\NetworkService permissions. Siemens identifies V3.1.2.2 or later as the fixed release.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

OT and industrial control system teams running Siemens TeleControl Server Basic, especially administrators responsible for systems exposing port 8000. Security teams should also review any environment where authenticated users can reach the application over the network.

Technical summary

The advisory states that the affected application is vulnerable to SQL injection through the internally used UnlockUser method. The attack requires authenticated remote access and network reachability to port 8000 on a system running a vulnerable version. Impact is severe because successful exploitation can bypass authorization controls, access and modify database contents, and lead to code execution under NT AUTHORITY\NetworkService.

Defensive priority

High. The issue is network-reachable, requires authentication, and is reported to enable database compromise and code execution. Prioritize systems exposed on port 8000 and move to the fixed version as soon as practical.

Recommended defensive actions

  • Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
  • Restrict access to port 8000 on affected systems to trusted IP addresses only.
  • Review network exposure and confirm whether any vulnerable instances are reachable from untrusted networks.
  • Apply defense-in-depth and ICS segmentation practices to limit access paths to the application.

Evidence notes

This debrief is based on the CISA CSAF advisory ICSA-25-112-01 and the linked Siemens product security notice for CVE-2025-32844. The source description explicitly names the UnlockUser method, the authenticated remote attack requirement, the port 8000 exposure condition, and the NT AUTHORITY\NetworkService execution context. The advisory was published on 2025-04-16 and revised on 2025-05-06 for typo fixes only.

Official resources

CISA published ICSA-25-112-01 / CVE-2025-32844 on 2025-04-16 and revised it on 2025-05-06 for typo fixes. The vendor advisory points to Siemens TeleControl Server Basic and recommends updating to V3.1.2.2 or later.