18 Apr
18Apr

Siemens has released a critical security advisory addressing 66 high-severity SQL injection vulnerabilities impacting its TeleControl Server Basic platform.
According to the Siemens advisory, attackers could exploit these vulnerabilities to bypass authentication, access or manipulate database contents, and even execute code within the operating system shell with β€œNT AUTHORITY\NetworkService” privileges. The issues stem from insecure legacy code patterns that have now been corrected.
β€œTeleControl Server Basic before V3.1.2.2 contains multiple SQL Injection vulnerabilities that could allow an attacker to read and write to the application’s DB, cause denial of service and execute code in an OS shell,” Siemens stated.


Each vulnerability is tracked with its own CVE identifier, and Siemens lists dozens of affected internal functionsβ€”such as CreateTrace, VerifyUser, Authenticate, and RestoreFromBackup. All carry high CVSS scores:
CVE-2025-27495 (CVSS 9.8)– Exploitable via CreateTrace, allows unauthenticated remote code execution.CVE-2025-27539 / CVE-2025-27540 (CVSS 9.8)– Affect user authentication methods, risking full DB compromise.CVE-2025-29905 through CVE-2025-32870 – Target various internal update and management functions, all exploitable by authenticated attackers.Most of the CVEs score 8.8 or 9.8 on CVSS v3.1, and 8.7 or 9.3 on CVSS v4.0.
Siemens recommends users upgrade to version V3.1.2.2 or later, available at their support portal.
In the meantime, Siemens urges customers to:
Restrict access to port 8000 to only trusted IP addresses.Apply their operational industrial security guidelines.β€œAs a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms,” the advisory states.
The vulnerabilities affect components responsible for configuration, authentication, logging, project management, and database operationsβ€”placing both availability and integrity at risk.

Comments
* The email will not be published on the website.