PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-32869 Siemens CVE debrief

CVE-2025-32869 is a high-severity vulnerability in Siemens TeleControl Server Basic. According to the CISA/Siemens advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may abuse SQL injection in the internally used ImportCertificate method to bypass authorization controls, read and write the application's database, and execute code with NT AUTHORITY\NetworkService permissions. Siemens and CISA published the advisory on 2025-04-16, with a later 2025-05-06 revision that only fixed typos.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

OT/ICS defenders, Windows-based TeleControl Server Basic operators, SOC teams monitoring externally reachable industrial services, and administrators responsible for segmenting access to port 8000.

Technical summary

The advisory describes SQL injection in TeleControl Server Basic's internally used ImportCertificate method. The attack requires authentication and network access to port 8000 on a system running a vulnerable version. Successful exploitation can bypass authorization, enable database read/write access, and lead to code execution as NT AUTHORITY\NetworkService. The source corpus identifies Siemens TeleControl Server Basic as the affected product and recommends restricting access to port 8000 to trusted IPs and updating to V3.1.2.2 or later.

Defensive priority

High. The issue combines remote network reachability, authentication bypass, database compromise, and potential code execution in an OT/ICS product; prioritize patching and exposure reduction.

Recommended defensive actions

  • Update Siemens TeleControl Server Basic to V3.1.2.2 or later.
  • Restrict access to port 8000 on affected systems to trusted IP addresses only.
  • Verify that TeleControl Server Basic is not exposed beyond required management or plant networks.
  • Review authentication and database access logs for unusual activity involving the affected service.
  • Apply compensating network segmentation controls recommended for industrial control systems.

Evidence notes

All substantive claims are drawn from the supplied CISA CSAF advisory ICSA-25-112-01 and its Siemens references. The advisory was published on 2025-04-16 and revised on 2025-05-06 with typo fixes only; no KEV listing or ransomware linkage was provided in the source corpus. The affected product, exploit path, impact, and remediation come from the advisory text and remediation entries.

Official resources

Publicly disclosed by CISA and Siemens on 2025-04-16; the source advisory was revised on 2025-05-06 for typo corrections only.