SQL Injection Vulnerability in TeleControl Server Basic by Siemens
CVE-2025-32840

8.7HIGH

Key Information:

Vendor
Siemens
Vendor
CVE Published:
16 April 2025

Summary

A significant SQL injection vulnerability has been discovered in TeleControl Server Basic versions prior to 3.1.2.2. This flaw is triggered through the 'LockGateway' method used internally by the application, allowing an authenticated remote attacker to bypass authorization controls. Successful exploitation could enable the attacker to read from and write to the application's database, as well as execute arbitrary code with the privileges of 'NT AUTHORITY\NetworkService'. The attack requires access to port 8000 on a system running the vulnerable version of the application, highlighting the urgency for users to update to a patched version to mitigate potential risks.

Affected Version(s)

TeleControl Server Basic 0

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

.