CVE-2025-32835

8.8 HIGH

📋 TL;DR

This SQL injection vulnerability in TeleControl Server Basic allows authenticated remote attackers to bypass authorization controls, read/write to the database, and execute code with NetworkService permissions. It affects all versions before V3.1.2.2. Attackers need access to port 8000 on systems running vulnerable versions.

💻 Affected Systems

Products:
  • TeleControl Server Basic
Versions: All versions < V3.1.2.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when port 8000 is accessible. Requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with NetworkService privileges leading to lateral movement, data exfiltration, and potential ransomware deployment across connected industrial control systems.

🟠

Likely Case

Database manipulation, credential theft, and unauthorized access to industrial control data and configurations.

🟢

If Mitigated

Limited impact with proper network segmentation, authentication controls, and monitoring detecting SQL injection attempts.

🌐 Internet-Facing: HIGH - Port 8000 exposed to internet allows remote authenticated attackers to exploit this vulnerability.
🏢 Internal Only: HIGH - Internal attackers with network access to port 8000 can exploit this vulnerability to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit once discovered. Requires authenticated access but leads to high-privilege code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.1.2.2

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-443402.html

Restart Required: Yes

Instructions:

1. Download V3.1.2.2 from Siemens support portal. 2. Backup current configuration. 3. Stop TeleControl Server Basic service. 4. Install the update. 5. Restart the service. 6. Verify version is V3.1.2.2 or higher.

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict access to port 8000/TCP to only trusted management networks

Windows Firewall: New-NetFirewallRule -DisplayName "Block TeleControl Port 8000" -Direction Inbound -LocalPort 8000 -Protocol TCP -Action Block

Authentication Hardening

all

Implement strong authentication controls and limit user privileges

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to port 8000 to only necessary systems
  • Deploy web application firewall (WAF) with SQL injection protection rules in front of the application

🔍 How to Verify

Check if Vulnerable:

Check TeleControl Server Basic version in application interface or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Siemens\TeleControl Server Basic\Version

Check Version:

reg query "HKLM\SOFTWARE\Siemens\TeleControl Server Basic" /v Version

Verify Fix Applied:

Verify version is V3.1.2.2 or higher in application interface or registry

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected process execution as NetworkService

Network Indicators:

  • SQL injection patterns in traffic to port 8000
  • Unusual outbound connections from TeleControl Server process

SIEM Query:

source="telecontrol_logs" AND ("sql" OR "injection" OR "union select") OR process_name="TeleControlServer.exe" AND parent_process!="services.exe"

🔗 References

📤 Share & Export