PatchSiren cyber security CVE debrief
CVE-2025-32854 Siemens CVE debrief
CVE-2025-32854 affects Siemens TeleControl Server Basic and was published on 2025-04-16. CISA and Siemens describe an SQL injection in the internally used LockOpcSettings method. If an authenticated remote attacker can reach port 8000 on a vulnerable system, they may bypass authorization controls, read and write the application's database, and execute code with NT AUTHORITY\NetworkService permissions. Siemens recommends updating to V3.1.2.2 or later and limiting access to port 8000 to trusted IP addresses only.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Operators and administrators running Siemens TeleControl Server Basic, especially systems exposed on port 8000 or reachable by authenticated remote users. OT/ICS teams, Windows service administrators, and defenders responsible for segmentation and patching should prioritize review.
Technical summary
The advisory describes a network-reachable SQL injection affecting the internally used LockOpcSettings method in Siemens TeleControl Server Basic. The attack requires authenticated access and connectivity to port 8000 on the vulnerable host. Successful exploitation can bypass authorization, manipulate application database content, and execute code as NT AUTHORITY\NetworkService. The vendor remediation is to update to V3.1.2.2 or later; the immediate mitigation is to restrict port 8000 to trusted IP addresses only.
Defensive priority
High. The issue is network reachable, requires authentication but can lead to authorization bypass, database compromise, and code execution, and it is scored CVSS 8.8 (HIGH).
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Confirm whether any deployments expose port 8000 beyond required OT or management boundaries.
- Apply ICS defense-in-depth and segmentation practices for systems that must remain online.
Evidence notes
All vulnerability details and mitigations are taken from the CISA CSAF advisory ICSA-25-112-01 and the Siemens advisory references included in the source corpus. The source advisory was published on 2025-04-16 and revised on 2025-05-06 for typo fixes. No exploit-in-the-wild, ransomware, or additional product-version details are asserted beyond the supplied material.
Official resources
-
CVE-2025-32854 CVE record
CVE.org
-
CVE-2025-32854 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Published by CISA and Siemens on 2025-04-16; source revised on 2025-05-06 for typo fixes.