PatchSiren cyber security CVE debrief
CVE-2025-32864 Siemens CVE debrief
CVE-2025-32864 affects Siemens TeleControl Server Basic and is described by CISA as an SQL injection issue in the internally used GetSettings method. A successful attack requires authenticated access and reachability of port 8000 on a system running a vulnerable version. If exploited, the flaw could let an attacker bypass authorization controls, read and write the application database, and execute code with NT AUTHORITY\NetworkService permissions. Siemens lists an update to V3.1.2.2 or later, and CISA also recommends restricting access to port 8000 to trusted IP addresses only.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Organizations running Siemens TeleControl Server Basic, especially OT/IT teams that expose or route traffic to port 8000 and administrators responsible for access control, patching, and network segmentation.
Technical summary
The advisory describes an SQL injection condition in the internal GetSettings method of TeleControl Server Basic. The attack vector is network-based with low attack complexity and requires low privileges but no user interaction. Impact is high across confidentiality, integrity, and availability. The vendor remediation is to update to V3.1.2.2 or later; the interim mitigation is to restrict access to port 8000 to trusted IP addresses.
Defensive priority
High. The issue is network-reachable, requires authentication, and carries high-impact consequences if exposed, but it has a vendor fix and a straightforward network-layer mitigation.
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Verify which hosts can reach the service and remove unnecessary exposure.
- Review authentication and authorization controls around the affected deployment.
- Apply standard OT network segmentation and defense-in-depth practices for externally reachable management services.
Evidence notes
All core claims in this debrief are taken from the CISA CSAF advisory ICSA-25-112-01 and its Siemens reference materials. The source states that the issue is SQL injection in the internally used GetSettings method, that exploitation requires authenticated remote access to port 8000, and that impact includes authorization bypass, database read/write, and code execution as NT AUTHORITY\NetworkService. The revision history shows the 2025-05-06 change was a typo fix rather than a substantive update.
Official resources
-
CVE-2025-32864 CVE record
CVE.org
-
CVE-2025-32864 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Published 2025-04-16 and revised 2025-05-06; the revision history notes the later change was a typo fix. Use 2025-04-16 as the advisory publication date.