

Cactus Ransomware – Active IOCs
April 23, 2025
RedLine Stealer – Active IOCs
April 23, 2025
Cactus Ransomware – Active IOCs
April 23, 2025
RedLine Stealer – Active IOCs
April 23, 2025Severity
High
Analysis Summary
CVE-2025-30032 CVSS:8.8
A vulnerability has been identified in TeleControl Server Basic. The affected application is vulnerable to SQL injection through the internally used 'UpdateDatabaseSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
CVE-2025-31349 CVSS:8.8
A vulnerability has been identified in TeleControl Server Basic. The affected application is vulnerable to SQL injection through the internally used 'UpdateSmtpSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
CVE-2025-31343 CVSS:8.8
A vulnerability has been identified in TeleControl Server Basic. The affected application is vulnerable to SQL injection through the internally used 'UpdateTcmSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
CVE-2025-30030 CVSS:8.8
A vulnerability has been identified in TeleControl Server Basic. The affected application is vulnerable to SQL injection through the internally used 'ImportDatabase' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
CVE-2025-30003 CVSS:8.8
A vulnerability has been identified in TeleControl Server Basic. The affected application is vulnerable to SQL injection through the internally used 'UpdateProjectConnections' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
CVE-2025-30002 CVSS:8.8
A vulnerability has been identified in TeleControl Server Basic. The affected application is vulnerable to SQL injection through the internally used 'UpdateConnectionVariables' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
CVE-2025-29905 CVSS:8.8
A vulnerability has been identified in TeleControl Server Basic The affected application is vulnerable to SQL injection through the internally used 'RestoreFromBackup' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
CVE-2025-27540 CVSS:9.8
A vulnerability has been identified in TeleControl Server Basi. The affected application is vulnerable to SQL injection through the internally used 'Authenticate' method. This could allow an unauthenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
CVE-2025-27539 CVSS:9.8
A vulnerability has been identified in TeleControl Server Basic. The affected application is vulnerable to SQL injection through the internally used 'VerifyUser' method. This could allow an unauthenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
CVE-2025-27495 CVSS:9.8
A vulnerability has been identified in TeleControl Server Basic. The affected application is vulnerable to SQL injection through the internally used 'CreateTrace' method. This could allow an unauthenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
Impact
- Security Bypass
- Code Execution
- Data Manipulation
Indicators of Compromise
CVE
- CVE-2025-30032
- CVE-2025-31349
- CVE-2025-31343
- CVE-2025-30030
- CVE-2025-30003
- CVE-2025-30002
- CVE-2025-29905
- CVE-2025-27540
- CVE-2025-27539
- CVE-2025-27495
Affected Vendors
Affected Products
- Siemens Telecontrol Server Basic - 3.1.2.2
Remediation
Refer to Siemens Security Advisory for patch, upgrade, or suggested workaround information.