PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-32850 Siemens CVE debrief

CVE-2025-32850 is a high-severity SQL injection vulnerability in Siemens TeleControl Server Basic. According to the CISA/Siemens advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may bypass authorization controls, read and write the application's database, and execute code as NT AUTHORITY\NetworkService. Siemens advises updating to V3.1.2.2 or later and restricting access to port 8000 to trusted IPs only.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

Organizations running Siemens TeleControl Server Basic, especially OT/ICS administrators, Windows server administrators, and network defenders responsible for systems exposed on port 8000.

Technical summary

The advisory describes SQL injection through the internally used LockTcmSettings method in TeleControl Server Basic. The attack requires authenticated remote access and reachability of port 8000. Successful exploitation can bypass authorization controls and lead to database read/write access plus code execution under the NT AUTHORITY\NetworkService account.

Defensive priority

High. The issue is network-reachable, requires only authenticated access, and has a severe confidentiality/integrity/availability impact profile (CVSS 8.8). Prioritize remediation on any exposed instance, especially where port 8000 is reachable beyond trusted networks.

Recommended defensive actions

  • Update Siemens TeleControl Server Basic to V3.1.2.2 or later using the vendor remediation guidance.
  • Restrict access to port 8000 on affected systems to trusted IP addresses only.
  • Verify which systems expose TeleControl Server Basic and confirm whether port 8000 is reachable from untrusted networks.
  • Apply standard ICS defense-in-depth and segmentation practices to reduce exposure of vulnerable OT services.

Evidence notes

This debrief is based on the CISA CSAF advisory ICSA-25-112-01 for CVE-2025-32850, published on 2025-04-16 and revised on 2025-05-06 with typo fixes only. The supplied source identifies Siemens TeleControl Server Basic as the affected product and states that a vulnerable system must be reachable on port 8000. No KEV entry was provided in the supplied enrichment.

Official resources

Publicly disclosed on 2025-04-16 via the CISA/Siemens advisory; the 2025-05-06 update in the source corpus is a revision for typos only.