PatchSiren cyber security CVE debrief
CVE-2025-32870 Siemens CVE debrief
CVE-2025-32870 is a high-severity SQL injection issue in Siemens TeleControl Server Basic. According to the advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may exploit the internally used GetTraces method to bypass authorization controls, read and write the application's database, and execute code with NT AUTHORITY\NetworkService permissions. Siemens and CISA both identify vendor remediation and access restriction as the primary defenses.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-16
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-16
- Advisory updated
- 2025-05-06
Who should care
Organizations running Siemens TeleControl Server Basic, especially environments where the service is reachable over port 8000. OT/ICS administrators, system owners, and defenders responsible for network segmentation, host hardening, and patch management should prioritize this issue.
Technical summary
The affected application is vulnerable to SQL injection through the internally used GetTraces method. The advisory states that exploitation requires authenticated access and network reachability to port 8000. Impact is severe: authorization bypass, database read/write access, and code execution under NT AUTHORITY\NetworkService. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, matching a network-reachable, low-complexity, high-impact flaw.
Defensive priority
High. The combination of remote reachability, authenticated exploitation, and full confidentiality/integrity/availability impact makes this a priority patching and exposure-reduction item for affected deployments.
Recommended defensive actions
- Update Siemens TeleControl Server Basic to V3.1.2.2 or later as directed by the vendor.
- Restrict access to port 8000 on affected systems to trusted IP addresses only.
- Verify which hosts expose the service and remove unnecessary network exposure.
- Review authentication and network segmentation around OT/ICS management services.
- Monitor vendor and CISA guidance for any follow-up remediation or clarifications.
Evidence notes
This debrief is based only on the supplied CISA CSAF advisory and its referenced Siemens materials. The source advisory was published on 2025-04-16 and revised on 2025-05-06 for typo fixes only. The exploit path, required access conditions, impact, and remediation come directly from the advisory text and remediation entries.
Official resources
-
CVE-2025-32870 CVE record
CVE.org
-
CVE-2025-32870 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published ICSA-25-112-01 and the associated CVE record on 2025-04-16; the source advisory was revised on 2025-05-06 for typo fixes. The provided corpus does not indicate a KEV listing.