PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-32858 Siemens CVE debrief

CVE-2025-32858 affects Siemens TeleControl Server Basic and was publicly disclosed on 2025-04-16. The advisory describes an SQL injection issue in the internally used UpdateWebServerGatewaySettings method. An authenticated remote attacker with access to port 8000 on a vulnerable system could bypass authorization controls, read and write the application's database, and execute code with NT AUTHORITY\NetworkService permissions. Siemens' remediation is to update to V3.1.2.2 or later; CISA also recommends restricting exposure of port 8000 to trusted IP addresses.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

Organizations running Siemens TeleControl Server Basic, especially OT/ICS operators exposing port 8000, as well as security teams responsible for perimeter filtering, asset inventory, and patching of Siemens-managed systems.

Technical summary

The supplied advisory identifies an SQL injection flaw in the internally used UpdateWebServerGatewaySettings method. The attack path requires authentication and network access to port 8000 on a vulnerable host. If exploited, the attacker may bypass authorization checks, interact with the database for read/write operations, and achieve code execution under the NetworkService account. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, matching a high-severity remote attack with low complexity and limited privileges.

Defensive priority

High. Treat as urgent for any exposed or reachable TeleControl Server Basic instance, because the flaw combines network reachability, authenticated access, database compromise, and potential code execution.

Recommended defensive actions

  • Update Siemens TeleControl Server Basic to V3.1.2.2 or later per vendor guidance.
  • Restrict access to port 8000 on affected systems to trusted IP addresses only.
  • Verify whether any instances are reachable from untrusted networks and remove unnecessary exposure.
  • Review authentication, application, and database logs for unexpected access or changes tied to the affected service.

Evidence notes

This debrief is based on the CISA CSAF advisory ICSA-25-112-01 for CVE-2025-32858, which cites Siemens TeleControl Server Basic and describes the SQL injection condition, required port 8000 access, and potential impacts. The supplied source also lists Siemens remediation to update to V3.1.2.2 or later and a mitigation to restrict port 8000 to trusted IP addresses. The advisory revision history shows an initial publication on 2025-04-16 and a typo-fixing revision on 2025-05-06.

Official resources

Publicly disclosed on 2025-04-16 in CISA CSAF advisory ICSA-25-112-01, with a subsequent typo-fixing revision on 2025-05-06.