Stack-Based Buffer Overflow in Siemens APOGEE and Desigo Products
CVE-2021-31886
9.8CRITICAL
Key Information:
- Vendor
- Siemens
- Status
- Vendor
- CVE Published:
- 9 November 2021
Summary
A vulnerability exists in Siemens APOGEE and Desigo products due to improper validation of the length of the 'USER' command in the FTP server. This oversight can lead to stack-based buffer overflows, potentially resulting in Denial-of-Service conditions and allowing remote code execution. Affected versions include various models of the APOGEE MBC, MEC, PXC, and Desigo, which could expose systems to significant risks if exploited.
Affected Version(s)
APOGEE MBC (PPC) (BACnet) All versions
APOGEE MBC (PPC) (P2 Ethernet) All versions
APOGEE MEC (PPC) (BACnet) All versions
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved