PatchSiren cyber security CVE debrief
CVE-2025-32859 Siemens CVE debrief
CVE-2025-32859 is a Siemens TeleControl Server Basic vulnerability that can let an authenticated remote attacker abuse SQL injection in the internally used LockWebServerGatewaySettings method. The advisory says the issue can bypass authorization controls, read and write the application database, and execute code as NT AUTHORITY\NetworkService when the vulnerable service is reachable on port 8000. Siemens' fix is documented as version V3.1.2.2 or later, and the CISA source advisory was first published on 2025-04-16 and revised on 2025-05-06 for typo corrections only.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
OT/ICS operators, Siemens TeleControl Server Basic administrators, network defenders who expose or route access to port 8000, and incident responders supporting environments where authenticated users can reach the application.
Technical summary
The reported weakness is SQL injection in the internally used LockWebServerGatewaySettings method. Because the attack is described as authenticated and network reachable, exploitation depends on a valid attacker identity plus access to port 8000 on a system running a vulnerable release. The stated impact includes authorization bypass, database read/write capability, and code execution under the NetworkService account context.
Defensive priority
High priority for any deployment where TeleControl Server Basic is reachable on port 8000 or where authenticated access is not tightly constrained. The CVSS score is 8.8 (HIGH), and the potential impact includes database compromise and service-account code execution.
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 to trusted IP addresses only.
- Review authentication and account access paths for any users who can reach the affected service.
- Confirm exposure of the affected service in OT/IT boundary segments and remove unnecessary network access.
- Monitor for unusual database activity or service-account execution tied to TeleControl Server Basic.
Evidence notes
All core facts in this debrief come from the supplied CISA CSAF advisory for ICSA-25-112-01 and the Siemens product advisory references. The timeline used here is the CVE/source publication date of 2025-04-16 and the revision date of 2025-05-06, which the source notes was for typo fixes. No exploit steps or unverified impact claims are included.
Official resources
-
CVE-2025-32859 CVE record
CVE.org
-
CVE-2025-32859 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Published by CISA on 2025-04-16 as ICSA-25-112-01 / CVE-2025-32859; the source advisory was revised on 2025-05-06 for typo corrections. Siemens remediation guidance identifies V3.1.2.2 or later as the fixed version.