Multiple SQL Injection Vulnerabilities in TeleControl Server Basic before V3.1.2.2
Act Now9.8SSA-443402Apr 16, 2025
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
TeleControl Server Basic before V3.1.2.2 contains multiple SQL injection vulnerabilities in legacy code patterns. An unauthenticated attacker with network access can read and write to the application database, cause denial of service, and execute operating system commands with NT AUTHORITY\NetworkService privileges. The root cause has been identified and fixed in version 3.1.2.2.
What this means
What could happen
An attacker with network access could inject SQL commands into TeleControl Server Basic to read or modify the database, deny service to operators, or execute operating system commands with limited privileges. This could compromise remote terminal server operations, alarm handling, or process data integrity.
Who's at risk
Water utilities, electric utilities, and industrial facilities using Siemens TeleControl Server Basic for remote terminal management, SCADA data display, or alarm handling should prioritize this update. Any organization relying on TeleControl Server Basic to manage field device communications or store operational data is at risk.
How it could be exploited
An attacker sends malicious SQL commands through a network-accessible input field or API endpoint of TeleControl Server Basic. The application concatenates user input directly into SQL queries without sanitization, allowing the attacker to break out of the intended query and execute arbitrary SQL or OS commands through SQL features like xp_cmdshell.
Prerequisites
- Network access to TeleControl Server Basic application port
- No authentication required to reach vulnerable input
- Application must be exposed to attacker's network
remotely exploitableno authentication requiredlow complexityhigh CVSS score (9.8)allows database read/writeallows OS command execution
Exploitability
Low exploit probability (EPSS 0.9%)
Affected products (1)
ProductAffected VersionsFix Status
TeleControl Server Basic< V3.1.2.23.1.2.2
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate TeleControl Server Basic to version 3.1.2.2 or later
CVEs (67)
CVE-2025-27495CVE-2025-27539CVE-2025-27540CVE-2025-29905CVE-2025-30002CVE-2025-30003CVE-2025-30030CVE-2025-30031CVE-2025-30032CVE-2025-31343CVE-2025-31349CVE-2025-31350CVE-2025-31351CVE-2025-31352CVE-2025-31353CVE-2025-32475CVE-2025-32822CVE-2025-32823CVE-2025-32824CVE-2025-32825CVE-2025-32826CVE-2025-32827CVE-2025-32828CVE-2025-32829CVE-2025-32830CVE-2025-32831CVE-2025-32832CVE-2025-32833CVE-2025-32834CVE-2025-32835CVE-2025-32836CVE-2025-32837CVE-2025-32838CVE-2025-32839CVE-2025-32840CVE-2025-32841CVE-2025-32842CVE-2025-32843CVE-2025-32844CVE-2025-32845CVE-2025-32846CVE-2025-32847CVE-2025-32848CVE-2025-32849CVE-2025-32850CVE-2025-32851CVE-2025-32852CVE-2025-32853CVE-2025-32854CVE-2025-32855CVE-2025-32856CVE-2025-32857CVE-2025-32858CVE-2025-32859CVE-2025-32860CVE-2025-32861CVE-2025-32862CVE-2025-32863CVE-2025-32864CVE-2025-32865CVE-2025-32866CVE-2025-32867CVE-2025-32868CVE-2025-32869CVE-2025-32870CVE-2025-32871CVE-2025-32872
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/84df7efe-da00-41d4-82c7-c5da104c4ea8