We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-38371



Description

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.7), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.21), APOGEE PXC Modular (BACnet) (All versions < V3.5.7), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.21), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET for Nucleus PLUS V1 (All versions < V5.2a), Nucleus NET for Nucleus PLUS V2 (All versions < V5.4), Nucleus ReadyStart V3 V2012 (All versions < V2012.08.1), Nucleus ReadyStart V3 V2017 (All versions < V2017.02.4), Nucleus Source Code (All versions including affected FTP server), TALON TC Compact (BACnet) (All versions < V3.5.7), TALON TC Modular (BACnet) (All versions < V3.5.7). The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server.

Reserved 2022-08-16 | Published 2022-10-11 | Updated 2024-09-17 | Assigner siemens


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-400: Uncontrolled Resource Consumption

Product status

Default status
unknown

All versions
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions
affected

Default status
unknown

Any version before V3.5.7
affected

Default status
unknown

Any version before V2.8.21
affected

Default status
unknown

Any version before V3.5.7
affected

Default status
unknown

Any version before V2.8.21
affected

Default status
unknown

V2.3 before *
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

V2.3 before *
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

V2.3 before *
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

All versions >= V2.3
affected

Default status
unknown

V2.3 before *
affected

Default status
unknown

All versions < V5.2a
affected

Default status
unknown

All versions < V5.4
affected

Default status
unknown

All versions < V2012.08.1
affected

Default status
unknown

All versions < V2017.02.4
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V3.5.7
affected

Default status
unknown

Any version before V3.5.7
affected

References

cert-portal.siemens.com/productcert/pdf/ssa-313313.pdf

cert-portal.siemens.com/productcert/pdf/ssa-935500.pdf

cert-portal.siemens.com/productcert/html/ssa-935500.html

cert-portal.siemens.com/productcert/html/ssa-313313.html

cve.org (CVE-2022-38371)

nvd.nist.gov (CVE-2022-38371)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-38371

Support options

Helpdesk Chat, Email, Knowledgebase