A vulnerability has been identified in APOGEE MBC (PPC) (P2 Ethernet) (All versions >= V2.6.3), APOGEE MEC (PPC) (P2 Ethernet) (All versions >= V2.6.3), APOGEE PXC Compact (BACnet) (All versions < V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions >= V2.8), APOGEE PXC Modular (BACnet) (All versions < V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions >= V2.8), TALON TC Compact (BACnet) (All versions < V3.5.3), TALON TC Modular (BACnet) (All versions < V3.5.3). The web server of affected devices lacks proper bounds checking when parsing the Host parameter in HTTP requests, which could lead to a buffer overflow. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on the device with root privileges.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-944498.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-944498.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
21 Nov 2024, 05:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-944498.pdf - Patch, Vendor Advisory |
28 Sep 2021, 16:24
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-944498.pdf - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
CPE | cpe:2.3:h:siemens:apogee_mbc_\(ppc\)_\(p2_ethernet\):*:*:*:*:*:*:*:* cpe:2.3:h:siemens:apogee_pxc_modular_\(p2_ethernet\):*:*:*:*:*:*:*:* cpe:2.3:h:siemens:talon_tc_modular_\(bacnet\):*:*:*:*:*:*:*:* cpe:2.3:h:siemens:apogee_mec_\(ppc\)_\(p2_ethernet\):*:*:*:*:*:*:*:* cpe:2.3:h:siemens:apogee_pxc_modular_\(bacnet\):*:*:*:*:*:*:*:* cpe:2.3:o:siemens:apogee_mbc_\(ppc\)_\(p2_ethernet\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:apogee_pxc_bacnet_automation_controller:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:apogee_pxc_modular_\(bacnet\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:apogee_mec_\(ppc\)_\(p2_ethernet\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:apogee_pxc_bacnet_automation_controller_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:apogee_pxc_compact_\(p2_ethernet\):*:*:*:*:*:*:*:* cpe:2.3:o:siemens:talon_tc_modular_\(bacnet\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:apogee_pxc_modular_\(p2_ethernet\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:apogee_pxc_compact_\(p2_ethernet\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:talon_tc_compact_\(bacnet\):*:*:*:*:*:*:*:* cpe:2.3:o:siemens:talon_tc_compact_\(bacnet\)_firmware:*:*:*:*:*:*:*:* |
14 Sep 2021, 11:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-14 11:15
Updated : 2024-11-21 05:57
NVD link : CVE-2021-27391
Mitre link : CVE-2021-27391
CVE.ORG link : CVE-2021-27391
JSON object : View
Products Affected
siemens
- apogee_mec_\(ppc\)_\(p2_ethernet\)
- apogee_pxc_modular_\(p2_ethernet\)_firmware
- talon_tc_compact_\(bacnet\)
- apogee_pxc_modular_\(p2_ethernet\)
- apogee_mec_\(ppc\)_\(p2_ethernet\)_firmware
- talon_tc_modular_\(bacnet\)_firmware
- talon_tc_modular_\(bacnet\)
- apogee_pxc_modular_\(bacnet\)
- apogee_pxc_compact_\(p2_ethernet\)
- talon_tc_compact_\(bacnet\)_firmware
- apogee_pxc_bacnet_automation_controller_firmware
- apogee_mbc_\(ppc\)_\(p2_ethernet\)
- apogee_pxc_modular_\(bacnet\)_firmware
- apogee_mbc_\(ppc\)_\(p2_ethernet\)_firmware
- apogee_pxc_compact_\(p2_ethernet\)_firmware
- apogee_pxc_bacnet_automation_controller
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')