PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-32870 Siemens CVE debrief

CVE-2025-32870 is a high-severity SQL injection issue in Siemens TeleControl Server Basic. According to the advisory, an authenticated remote attacker who can reach port 8000 on a vulnerable system may exploit the internally used GetTraces method to bypass authorization controls, read and write the application's database, and execute code with NT AUTHORITY\NetworkService permissions. Siemens and CISA both identify vendor remediation and access restriction as the primary defenses.

Vendor
Siemens
Product
TeleControl Server Basic
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-16
Original CVE updated
2025-05-06
Advisory published
2025-04-16
Advisory updated
2025-05-06

Who should care

Organizations running Siemens TeleControl Server Basic, especially environments where the service is reachable over port 8000. OT/ICS administrators, system owners, and defenders responsible for network segmentation, host hardening, and patch management should prioritize this issue.

Technical summary

The affected application is vulnerable to SQL injection through the internally used GetTraces method. The advisory states that exploitation requires authenticated access and network reachability to port 8000. Impact is severe: authorization bypass, database read/write access, and code execution under NT AUTHORITY\NetworkService. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, matching a network-reachable, low-complexity, high-impact flaw.

Defensive priority

High. The combination of remote reachability, authenticated exploitation, and full confidentiality/integrity/availability impact makes this a priority patching and exposure-reduction item for affected deployments.

Recommended defensive actions

  • Update Siemens TeleControl Server Basic to V3.1.2.2 or later as directed by the vendor.
  • Restrict access to port 8000 on affected systems to trusted IP addresses only.
  • Verify which hosts expose the service and remove unnecessary network exposure.
  • Review authentication and network segmentation around OT/ICS management services.
  • Monitor vendor and CISA guidance for any follow-up remediation or clarifications.

Evidence notes

This debrief is based only on the supplied CISA CSAF advisory and its referenced Siemens materials. The source advisory was published on 2025-04-16 and revised on 2025-05-06 for typo fixes only. The exploit path, required access conditions, impact, and remediation come directly from the advisory text and remediation entries.

Official resources

CISA published ICSA-25-112-01 and the associated CVE record on 2025-04-16; the source advisory was revised on 2025-05-06 for typo fixes. The provided corpus does not indicate a KEV listing.