Siemens TeleControl Server Basic SQL
Plan PatchCVSS 9.8ICS-CERT ICSA-25-112-01Apr 16, 2025
Siemens
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
TeleControl Server Basic before V3.1.2.2 contains multiple SQL injection vulnerabilities in the web application that allow unauthenticated remote attackers to read and write to the application's database, cause denial of service, and execute code in an OS shell with "NT AUTHORITY\NetworkService" permissions. Siemens has released version 3.1.2.2 which fixes all identified SQL injection occurrences.
What this means
What could happen
An attacker could inject SQL commands into TeleControl Server Basic to read sensitive configuration data, modify database records, or execute system commands with service-level privileges, potentially disrupting remote terminal unit (RTU) operations or allowing persistent unauthorized access.
Who's at risk
Water authorities and utilities operating Siemens TeleControl Server Basic for remote terminal unit (RTU) management and telemetry. Any organization using TeleControl Server Basic versions prior to 3.1.2.2 for SCADA gateway or data aggregation functions should prioritize this update.
How it could be exploited
An attacker with network access to port 8000 could send specially crafted SQL injection payloads through the application's web interface or API, allowing direct execution of arbitrary SQL commands against the backend database. This could escalate to OS command execution within the service context.
Prerequisites
- Network access to port 8000 on TeleControl Server Basic
- No authentication required
Remotely exploitableNo authentication requiredLow complexityHigh CVSS (9.8)Affects system and data integrity
Exploitability
Unlikely to be exploited — EPSS score 1.0%
Affected products (1)
ProductAffected VersionsFix Status
TeleControl Server Basic<V3.1.2.23.1.2.2
Remediation & Mitigation
0/3
Do now
0/1WORKAROUNDRestrict firewall rules to allow access to port 8000 only from trusted IP addresses (engineering stations, authorized operations centers)
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate TeleControl Server Basic to version 3.1.2.2 or later
Long-term hardening
0/1HARDENINGSegment TeleControl Server Basic on a dedicated network or VLAN isolated from general business network traffic
CVEs (67)
CVE-2025-27495CVE-2025-27539CVE-2025-27540CVE-2025-29905CVE-2025-30002CVE-2025-30003CVE-2025-30030CVE-2025-30031CVE-2025-30032CVE-2025-31343CVE-2025-31349CVE-2025-31350CVE-2025-31351CVE-2025-31352CVE-2025-31353CVE-2025-32475CVE-2025-32822CVE-2025-32823CVE-2025-32824CVE-2025-32825CVE-2025-32826CVE-2025-32827CVE-2025-32828CVE-2025-32829CVE-2025-32830CVE-2025-32831CVE-2025-32832CVE-2025-32833CVE-2025-32834CVE-2025-32835CVE-2025-32836CVE-2025-32837CVE-2025-32838CVE-2025-32839CVE-2025-32840CVE-2025-32841CVE-2025-32842CVE-2025-32843CVE-2025-32844CVE-2025-32845CVE-2025-32846CVE-2025-32847CVE-2025-32848CVE-2025-32849CVE-2025-32850CVE-2025-32851CVE-2025-32852CVE-2025-32853CVE-2025-32854CVE-2025-32855CVE-2025-32856CVE-2025-32857CVE-2025-32858CVE-2025-32859CVE-2025-32860CVE-2025-32861CVE-2025-32862CVE-2025-32863CVE-2025-32864CVE-2025-32865CVE-2025-32866CVE-2025-32867CVE-2025-32868CVE-2025-32869CVE-2025-32870CVE-2025-32871CVE-2025-32872
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/700ed39c-744e-41d5-a3d2-49a68a645a4eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.