Stack-based Buffer Overflow in Siemens APOGEE and Desigo Products
CVE-2021-31888
8.8HIGH
Key Information:
- Vendor
- Siemens
- Status
- Vendor
- CVE Published:
- 9 November 2021
Summary
A vulnerability has been detected in Siemens APOGEE and Desigo products, where the FTP server fails to validate the length of the 'MKD/XMKD' command appropriately. This mismanagement can lead to stack-based buffer overflows, potentially resulting in Denial-of-Service conditions as well as enabling Remote Code Execution exploits. It affects a wide range of versions across various models, necessitating immediate attention to mitigate possible risks.
Affected Version(s)
APOGEE MBC (PPC) (BACnet) All versions
APOGEE MBC (PPC) (P2 Ethernet) All versions
APOGEE MEC (PPC) (BACnet) All versions
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved