Cyber Posture

CVE-2025-40765

Critical

Published: 14 October 2025

Published
14 October 2025
Modified
21 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to collect credentials.

Security Summary

CVE-2025-40765 is an information disclosure vulnerability (CWE-306) in TeleControl Server Basic V3.1, affecting all versions greater than or equal to V3.1.2.2 and less than V3.1.2.3. The flaw resides in the affected application and enables the exposure of sensitive user password hashes.

An unauthenticated remote attacker can exploit this vulnerability over the network with low attack complexity, requiring no privileges or user interaction, as reflected in its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Exploitation allows the attacker to obtain the password hashes, subsequently log in to the database service, and perform authenticated operations.

Siemens has published Security Advisory SSA-062309 addressing this issue, available at https://cert-portal.siemens.com/productcert/html/ssa-062309.html.

Details

CWE(s)
CWE-306

Affected Products

siemens
telecontrol server basic
3.1.2.2

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1212 Exploitation for Credential Access Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
Why these techniques?

Unauthenticated remote exploitation of a public-facing application discloses password hashes, enabling initial access (T1190) and credential access via exploitation (T1212).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References