Overview
CVE-2025-32855 is a significant cybersecurity vulnerability affecting all versions of TeleControl Server Basic prior to V3.1.2.2. This vulnerability is a type of SQL Injection, a common and dangerous security flaw that can be exploited by an attacker to manipulate the application’s database. It was identified that the ‘UnlockOpcSettings’ method, internally used by the application, is susceptible to this SQL injection attack. The vulnerability is particularly concerning because it allows an authenticated attacker to bypass authorization controls, read from, write to the application’s database, and even execute code with “NT AUTHORITYNetworkService” permissions. Given these capabilities, this vulnerability could potentially lead to system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2025-32855
Severity: High (8.8 CVSS Score)
Attack Vector: Network
Privileges Required: Low (Authenticated Users)
User Interaction: None
Impact: Bypass of authorization controls, potential system compromise and data leakage
Affected Products
No phone number, email, or personal info required.
Product | Affected Versions
TeleControl Server Basic | All versions < V3.1.2.2 How the Exploit Works
An attacker who has gained authenticated access to the TeleControl Server Basic application can exploit this vulnerability by sending specially crafted SQL queries through the ‘UnlockOpcSettings’ method. This method fails to properly sanitize user input, allowing an attacker to manipulate the SQL commands executed by the application. Consequently, an attacker can read from and write to the application’s database, bypassing authorization controls, and potentially compromising the system or leaking data.
Conceptual Example Code
Please note that the following code is a conceptual example and may not work as is. It’s provided to illustrate how an attacker might exploit the vulnerability:
POST /UnlockOpcSettings HTTP/1.1
Host: target.example.com
Content-Type: application/json
{
"parameter": "'; DROP TABLE users; --"
}
In this example, the attacker sends a malicious POST request to the ‘UnlockOpcSettings’ endpoint. The ‘parameter’ field contains a SQL query that, if not properly sanitized by the application, would result in the deletion of the ‘users’ table from the database.
Mitigation
Vendors have released a patch to address this vulnerability. Users of affected versions of TeleControl Server Basic are urged to update their software to version 3.1.2.2 or later as soon as possible. As a temporary mitigation measure, users could also employ a Web Application Firewall (WAF) or Intrusion Detection System (IDS) to detect and prevent SQL injection attempts.