THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)

Ok

PUBLISHED

CVE-2022-38371

Reserved:2022-08-16
Published:2022-10-11
Updated:2024-05-15

Description

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.7), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.21), APOGEE PXC Modular (BACnet) (All versions < V3.5.7), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.21), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET for Nucleus PLUS V1 (All versions < V5.2a), Nucleus NET for Nucleus PLUS V2 (All versions < V5.4), Nucleus ReadyStart V3 V2012 (All versions < V2012.08.1), Nucleus ReadyStart V3 V2017 (All versions < V2017.02.4), Nucleus Source Code (All versions including affected FTP server), TALON TC Compact (BACnet) (All versions < V3.5.7), TALON TC Modular (BACnet) (All versions < V3.5.7). The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server.



HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-400: Uncontrolled Resource Consumption

Product status

Default status
unknown

All versions
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions
affected

Default status
unknown

Any version before V3.5.7
affected

Default status
unknown

Any version before V2.8.21
affected

Default status
unknown

Any version before V3.5.7
affected

Default status
unknown

Any version before V2.8.21
affected

Default status
unknown

V2.3 before *
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

V2.3 before *
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

V2.3 before *
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

V2.3 before *
affected

Default status
unknown

All versions < V5.2a
affected

Default status
unknown

All versions < V5.4
affected

Default status
unknown

All versions < V2012.08.1
affected

Default status
unknown

All versions < V2017.02.4
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V3.5.7
affected

Default status
unknown

Any version before V3.5.7
affected

References

https://cert-portal.siemens.com/productcert/pdf/ssa-313313.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-935500.pdf

https://cert-portal.siemens.com/productcert/html/ssa-935500.html

https://cert-portal.siemens.com/productcert/html/ssa-313313.html

cve.org CVE-2022-38371

nvd.nist.gov CVE-2022-38371

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-38371