Buffer Overflow in APOGEE and TALON Devices by Siemens
CVE-2021-27391

9.8CRITICAL

Summary

A buffer overflow vulnerability exists in Siemens' APOGEE and TALON devices due to inadequate bounds checking of the Host parameter in HTTP requests. This weakness allows unauthenticated remote attackers to potentially execute arbitrary code with root privileges, putting critical systems at risk. Proper mitigations and updates are essential to safeguard against such exploits.

Affected Version(s)

APOGEE MBC (PPC) (P2 Ethernet) All versions >= V2.6.3

APOGEE MEC (PPC) (P2 Ethernet) All versions >= V2.6.3

APOGEE PXC Compact (BACnet) All versions < V3.5.3

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.