HIGH · 7.5

CVE-2022-38371

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet)...

Vulnerability Description

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.7), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.21), APOGEE PXC Modular (BACnet) (All versions < V3.5.7), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.21), Desigo PXC00-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC00-U (All versions >= V2.3 < V6.30.37), Desigo PXC001-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC100-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC12-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC128-U (All versions >= V2.3 < V6.30.37), Desigo PXC200-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC22-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC22.1-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC36.1-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC50-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC64-U (All versions >= V2.3 < V6.30.37), Desigo PXM20-E (All versions >= V2.3 < V6.30.37), Nucleus NET for Nucleus PLUS V1 (All versions < V5.2a), Nucleus NET for Nucleus PLUS V2 (All versions < V5.4), Nucleus ReadyStart V3 V2012 (All versions < V2012.08.1), Nucleus ReadyStart V3 V2017 (All versions < V2017.02.4), Nucleus Source Code (All versions including affected FTP server), TALON TC Compact (BACnet) (All versions < V3.5.7), TALON TC Modular (BACnet) (All versions < V3.5.7). The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
SiemensNucleus NetAll versions
SiemensNucleus Readystart V3All versions
SiemensNucleus Source Code-
SiemensApogee Modular Building Controller FirmwareAll versions
SiemensApogee Modular Building Controller-
SiemensApogee Modular Equiment Controller FirmwareAll versions
SiemensApogee Modular Equiment Controller-
SiemensApogee Pxc Compact FirmwareAll versions
SiemensApogee Pxc Compact-
SiemensApogee Pxc Modular FirmwareAll versions
SiemensApogee Pxc Modular-
SiemensDesigo Pxc00-E.D Firmware<= 2.3
SiemensDesigo Pxc00-E.D-
SiemensDesigo Pxc00-U Firmware<= 2.3
SiemensDesigo Pxc00-U-
SiemensDesigo Pxc001-E.D Firmware<= 2.3
SiemensDesigo Pxc001-E.D-
SiemensDesigo Pxc12-E.D Firmware<= 2.3
SiemensDesigo Pxc12-E.D-
SiemensDesigo Pxc22-E.D Firmware<= 2.3

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-38371?

CVE-2022-38371 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet)...

How severe is CVE-2022-38371?

CVE-2022-38371 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-38371?

Check the references section above for vendor advisories and patch information. Affected products include: Siemens Nucleus Net, Siemens Nucleus Readystart V3, Siemens Nucleus Source Code, Siemens Apogee Modular Building Controller Firmware, Siemens Apogee Modular Building Controller.