PatchSiren cyber security CVE debrief
CVE-2025-40942 Siemens CVE debrief
CVE-2025-40942 affects Siemens TeleControl Server Basic and is described by CISA as a local privilege escalation vulnerability that could allow an attacker to run arbitrary code with elevated privileges. The advisory reports a CVSS v3.1 score of 8.8 (High) with a local attack vector and elevated impact. Siemens recommends updating to V3.1.2.4 or later.
- Vendor
- Siemens
- Product
- TeleControl Server Basic
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-01-13
- Original CVE updated
- 2026-01-14
- Advisory published
- 2026-01-13
- Advisory updated
- 2026-01-14
Who should care
Organizations that deploy or administer Siemens TeleControl Server Basic, especially in industrial control system or OT environments, should prioritize this issue because successful exploitation could elevate a local attacker to privileged code execution.
Technical summary
The published advisory characterizes the flaw as a local privilege escalation with CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H. That means exploitation requires local access and some privileges, but can lead to elevated code execution and broad confidentiality, integrity, and availability impact. The vendor remediation is to upgrade TeleControl Server Basic to version V3.1.2.4 or later.
Defensive priority
High. Even though exploitation is local, the combination of privilege escalation and arbitrary code execution with elevated privileges makes this a serious risk for systems where an attacker can obtain a foothold.
Recommended defensive actions
- Upgrade Siemens TeleControl Server Basic to V3.1.2.4 or later.
- Verify which hosts run TeleControl Server Basic and confirm their current version against the vendor advisory.
- Restrict local access and administrative privileges on affected systems to reduce escalation opportunity.
- Monitor affected hosts for unexpected privileged process creation or configuration changes.
- Apply standard industrial control system hardening and defense-in-depth practices referenced by CISA.
Evidence notes
This debrief is based on the CISA CSAF advisory ICSA-26-015-03 for Siemens TeleControl Server Basic and the linked Siemens ProductCERT advisory SSA-192617. The source states the issue is a local privilege escalation that can allow arbitrary code execution with elevated privileges, assigns CVSS v3.1 8.8/High, and recommends updating to V3.1.2.4 or later. Timing context uses the advisory publication date of 2026-01-13 and the republication/update date of 2026-01-14 from the source record.
Official resources
-
CVE-2025-40942 CVE record
CVE.org
-
CVE-2025-40942 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in CISA advisory ICSA-26-015-03 on 2026-01-13, with the source record republished on 2026-01-14 to reflect Siemens ProductCERT advisory SSA-192617.