OTPulse

Siemens TeleControl Server Basic

Low Risk3.7ICS-CERT ICSA-25-112-02Apr 16, 2025
Attack VectorNetwork
Auth RequiredNone
ComplexityHigh
User InteractionNone needed
Summary

TeleControl Server Basic before version 3.1.2.2 contains an improper handling of length parameter inconsistency vulnerability (CWE-130). An attacker can send crafted network packets with inconsistent length parameters that cause the application to allocate exhaustive amounts of memory, resulting in a denial of service condition. The application fails to properly validate parameter consistency before performing memory allocation based on those values.

What this means
What could happen
An attacker who sends specially crafted network packets to TeleControl Server Basic could cause excessive memory allocation, leading to a denial of service condition where the server becomes unavailable and unable to relay control signals between facilities.
Who's at risk
Water and electric utilities that rely on Siemens TeleControl Server Basic for remote communication and signaling between control facilities should assess their use of this product. This vulnerability affects any facility using TeleControl Server Basic versions prior to 3.1.2.2 for SCADA signal transmission or distributed control operations.
How it could be exploited
An attacker sends network packets with inconsistent length parameters to TeleControl Server Basic. The application fails to validate the parameter consistency, causing it to allocate memory based on the incorrect values, eventually exhausting available memory and crashing the service.
Prerequisites
  • Network access to TeleControl Server Basic port or interface
  • No credentials required
  • Attacker must craft packets with specific length parameter inconsistencies that the server will accept
Remotely exploitableNo authentication requiredHigh attack complexity limits real-world riskAffects availability of control signal relay
Exploitability
Low exploit probability (EPSS 0.4%)
Affected products (1)
ProductAffected VersionsFix Status
TeleControl Server Basic<V3.1.2.23.1.2.2
Remediation & Mitigation
0/4
Do now
0/2
WORKAROUNDDisable TeleControl Server Basic redundancy if it is not actively used in your operation
HARDENINGRestrict network access to TeleControl Server Basic using firewall rules; do not expose the service to the internet
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate TeleControl Server Basic to version 3.1.2.2 or later
Long-term hardening
0/1
HARDENINGSegment TeleControl Server Basic and related devices onto an isolated control network separate from business networks
↑↓ Navigate · Esc Close
API: /api/v1/advisories/f47d346a-b8fa-4550-b74e-d2d40132d7da