PatchSiren cyber security CVE debrief
CVE-2025-32847 Siemens CVE debrief
CVE-2025-32847 affects Siemens TeleControl Server Basic and was publicly disclosed on 2025-04-16 in CISA advisory ICSA-25-112-01 / Siemens advisory SSA-443402. The issue is an SQL injection in the internally used UnlockGeneralSettings method; an authenticated remote attacker who can reach port 8000 may bypass authorization controls, read and write the application's database, and execute code as NT AUTHORITY\\NetworkService.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Organizations running Siemens TeleControl Server Basic, especially OT/ICS teams, Windows administrators, and security teams responsible for network exposure control on systems that listen on port 8000.
Technical summary
The supplied advisory describes a network-reachable SQL injection reachable through an internal UnlockGeneralSettings method. The CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (8.8 HIGH), indicating remote exploitation with low complexity after authentication and network access. The vendor remediation is to update to V3.1.2.2 or later; the interim mitigation is to restrict access to port 8000 to trusted IP addresses only.
Defensive priority
High — prioritize quickly if TeleControl Server Basic is deployed and port 8000 is reachable from untrusted networks or broad internal segments.
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Verify which hosts expose TeleControl Server Basic on port 8000 and remove unnecessary exposure.
- Review authentication and network segmentation around the application before applying the vendor fix.
- Monitor affected systems for unexpected database changes or service behavior until remediation is complete.
Evidence notes
Primary evidence comes from the CISA CSAF advisory (ICSA-25-112-01) and the Siemens CERT advisory referenced in the source corpus. The source text states that the flaw is SQL injection in UnlockGeneralSettings, requires authenticated remote access with reachability to port 8000, and can lead to authorization bypass, database read/write, and code execution as NT AUTHORITY\\NetworkService. The advisory was published on 2025-04-16 and revised on 2025-05-06 for typos only; no KEV listing is present in the supplied data.
Official resources
-
CVE-2025-32847 CVE record
CVE.org
-
CVE-2025-32847 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed on 2025-04-16 as ICSA-25-112-01 / SSA-443402; revised on 2025-05-06 for typos.