We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-29931



Description

A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected product does not properly validate a length field in a serialized message which it uses to determine the amount of memory to be allocated for deserialization. This could allow an unauthenticated remote attacker to cause the application to allocate exhaustive amounts of memory and subsequently create a partial denial of service condition. Successful exploitation is only possible in redundant Telecontrol Server Basic setups and only if the connection between the redundant servers has been disrupted.

Reserved 2025-03-12 | Published 2025-04-17 | Updated 2025-04-17 | Assigner siemens


LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-130: Improper Handling of Length Parameter Inconsistency

Product status

Default status
unknown

Any version before V3.1.2.2
affected

References

cert-portal.siemens.com/productcert/html/ssa-395348.html

cve.org (CVE-2025-29931)

nvd.nist.gov (CVE-2025-29931)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-29931

Support options

Helpdesk Chat, Email, Knowledgebase