SQL Injection Vulnerability in TeleControl Server Basic by Siemens
CVE-2025-32861
8.7HIGH
Summary
A vulnerability in TeleControl Server Basic exposes all versions prior to 3.1.2.2 to SQL injection risks through the 'UpdateTraceLevelSettings' method. This flaw enables an authenticated remote attacker to bypass authorization restrictions, allowing unauthorized access to read and manipulate the application's database. Additionally, successful exploitation could enable code execution with the 'NT AUTHORITY\NetworkService' permissions. To leverage this vulnerability, an attacker must gain access to port 8000 on a system running the vulnerable application.
Affected Version(s)
TeleControl Server Basic 0
References
CVSS V4
Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published