CVE-2025-40942

8.8 HIGH

📋 TL;DR

A local privilege escalation vulnerability in TeleControl Server Basic allows attackers with local access to execute arbitrary code with elevated privileges. All versions before V3.1.2.4 are affected. This could enable complete system compromise on vulnerable installations.

💻 Affected Systems

Products:
  • TeleControl Server Basic
Versions: All versions < V3.1.2.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system running TeleControl Server Basic. Typically affects industrial control systems and SCADA environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover where an attacker gains SYSTEM/root privileges, installs persistent malware, accesses sensitive data, and pivots to other systems.

🟠

Likely Case

Attacker with initial access escalates privileges to install additional tools, maintain persistence, and access protected resources on the compromised system.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring that detects privilege escalation attempts.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Local privilege escalation vulnerabilities typically have low exploitation complexity once initial access is obtained. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.1.2.4

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-192617.html

Restart Required: Yes

Instructions:

1. Download TeleControl Server Basic V3.1.2.4 from Siemens support portal. 2. Backup current configuration and data. 3. Stop TeleControl Server Basic service. 4. Install the update. 5. Restart the system. 6. Verify service is running correctly.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to TeleControl Server Basic systems to authorized personnel only

Implement Least Privilege

windows

Ensure TeleControl Server Basic runs with minimal necessary privileges

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local access to affected systems
  • Deploy endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check TeleControl Server Basic version in Control Panel > Programs and Features or via Siemens SIMATIC Management Console

Check Version:

wmic product where name="TeleControl Server Basic" get version

Verify Fix Applied:

Verify installed version is V3.1.2.4 or later and check system logs for successful update installation

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • TeleControl Server Basic service restarts
  • New administrative account creation

Network Indicators:

  • Unusual outbound connections from TeleControl Server Basic system
  • Lateral movement attempts from affected system

SIEM Query:

EventID=4688 AND ProcessName LIKE '%TeleControl%' AND NewProcessName LIKE '%cmd%' OR NewProcessName LIKE '%powershell%'

🔗 References

📤 Share & Export