Buffer Overflow in APOGEE and TALON Devices by Siemens
CVE-2021-27391
9.8CRITICAL
Key Information:
- Vendor
- Siemens
- Status
- Vendor
- CVE Published:
- 14 September 2021
Summary
A buffer overflow vulnerability exists in Siemens' APOGEE and TALON devices due to inadequate bounds checking of the Host parameter in HTTP requests. This weakness allows unauthenticated remote attackers to potentially execute arbitrary code with root privileges, putting critical systems at risk. Proper mitigations and updates are essential to safeguard against such exploits.
Affected Version(s)
APOGEE MBC (PPC) (P2 Ethernet) All versions >= V2.6.3
APOGEE MEC (PPC) (P2 Ethernet) All versions >= V2.6.3
APOGEE PXC Compact (BACnet) All versions < V3.5.3
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved