PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-32868 Siemens CVE debrief

CVE-2025-32868 affects Siemens TeleControl Server Basic and is described by CISA as an SQL injection issue in the internally used ExportCertificate method. A remote authenticated attacker with access to port 8000 may bypass authorization controls, read and write the database, and execute code as NT AUTHORITY\NetworkService.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

Organizations running Siemens TeleControl Server Basic, especially OT/ICS teams that expose or route traffic to port 8000, should treat this as a high-priority application security issue. Security and incident response teams should confirm exposure, apply the vendor fix, and verify that access to the service is tightly restricted.

Technical summary

The advisory states that the vulnerable application’s internally used ExportCertificate method is susceptible to SQL injection. The affected attack path requires an authenticated remote attacker to reach port 8000 on a host running a vulnerable version. Successful exploitation can bypass authorization controls and impact confidentiality, integrity, and availability by allowing database read/write access and code execution with NT AUTHORITY\NetworkService permissions. Siemens’ remediation is to update to V3.1.2.2 or later and restrict access to port 8000 to trusted IP addresses only.

Defensive priority

High priority. The reported CVSS 3.1 score is 8.8, and the described impact includes auth bypass and code execution on an OT-facing server process. Exposure of port 8000 should be treated as an immediate risk reducer, alongside prompt patching.

Recommended defensive actions

  • Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
  • Restrict access to port 8000 on affected systems to trusted IP addresses only.
  • Inventory all TeleControl Server Basic deployments and verify which hosts are reachable on the affected port.
  • Review authentication and database activity on exposed systems for unexpected access patterns.
  • Use CISA and Siemens advisories as the primary remediation references for environment-specific validation.

Evidence notes

This debrief is based on the CISA CSAF advisory ICSA-25-112-01 and Siemens’ referenced product security notice for CVE-2025-32868. The source advisory was published on 2025-04-16 and later revised on 2025-05-06 for typo fixes only. The supplied source also lists the vendor fix and network-restriction mitigation for port 8000.

Official resources

CISA’s advisory ICSA-25-112-01 was published on 2025-04-16, with a later revision on 2025-05-06 limited to typo fixes. The advisory identifies Siemens TeleControl Server Basic as the affected product and recommends updating to V3.1.2.2 or a