PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-32848 Siemens CVE debrief

CVE-2025-32848 affects Siemens TeleControl Server Basic and is described by CISA as an SQL injection flaw in the internally used LockSmtpSettings method. The advisory says an authenticated remote attacker who can access port 8000 on a vulnerable system may bypass authorization controls, read and write the application's database, and execute code as NT AUTHORITY\NetworkService. Siemens and CISA list a vendor fix at V3.1.2.2 or later and recommend restricting access to port 8000 to trusted IP addresses only. Public advisory date: 2025-04-16; a later 2025-05-06 revision is noted as typo fixes only.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

Organizations running Siemens TeleControl Server Basic, especially OT/ICS operators, system owners, network defenders, and incident responders responsible for systems where port 8000 is reachable.

Technical summary

The supplied advisory corpus describes a SQL injection vulnerability in the LockSmtpSettings method used internally by Siemens TeleControl Server Basic. Attack prerequisites include valid authenticated access and network reachability to port 8000. Successful exploitation may allow authorization bypass, database read/write access, and code execution under NT AUTHORITY\NetworkService. The CVSS vector provided is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, which aligns with a high-severity remote attack path.

Defensive priority

High. Treat as urgent for any deployment where port 8000 is reachable beyond a tightly trusted management boundary, and prioritize remediation if the product is internet-exposed or broadly reachable inside the environment.

Recommended defensive actions

  • Upgrade Siemens TeleControl Server Basic to V3.1.2.2 or later.
  • Restrict access to port 8000 on affected systems to trusted IP addresses only.
  • Review authentication and network segmentation around TeleControl Server Basic management interfaces.
  • Monitor for unexpected database access, authorization failures, and anomalous service activity on affected hosts.
  • Apply CISA and Siemens OT hardening guidance for defense-in-depth and least-privilege network access.

Evidence notes

All technical claims in this debrief are taken from the supplied CISA CSAF source item and its listed Siemens/CISA references. The corpus explicitly states the SQL injection location (LockSmtpSettings), attacker prerequisites (authenticated remote access and port 8000 reachability), impact (authorization bypass, database read/write, and code execution as NT AUTHORITY\NetworkService), and remediation (restrict port 8000; update to V3.1.2.2 or later). No unsupported version range beyond the fixed version is asserted here.

Official resources

Public advisory disclosure date: 2025-04-16. The source record shows a 2025-05-06 revision marked as typo fixes only. This debrief uses the supplied CVE/advisory dates for timing context and does not infer any earlier or later disclosure.