We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-22039



Assignersiemens
Reserved2024-01-04
Published2024-03-12
Updated2024-08-01

Description

A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions < IP8), Cerberus PRO EN Fire Panel FC72x IP6 (All versions < IP6 SR3), Cerberus PRO EN Fire Panel FC72x IP7 (All versions < IP7 SR5), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions < V3.0.6602), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.0.5016), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions < V3.2.6601), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.2.5015), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions < MP8), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions < MP6 SR3), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions < MP7 SR5), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions < V3.0.6602), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions < V3.2.6601), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.2.5015), Sinteso Mobile (All versions < V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow. This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges.



CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

Problem types

CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unknown

Any version before IP8
affected

Default status
unknown

Any version before IP6 SR3
affected

Default status
unknown

Any version before IP7 SR5
affected

Default status
unknown

Any version before V3.0.6602
affected

Default status
unknown

Any version before V4.0.5016
affected

Default status
unknown

Any version before V3.2.6601
affected

Default status
unknown

Any version before V4.2.5015
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before V4.3.0001
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before V4.3.0001
affected

Default status
unknown

Any version before MP8
affected

Default status
unknown

Any version before MP6 SR3
affected

Default status
unknown

Any version before MP7 SR5
affected

Default status
unknown

Any version before V3.0.6602
affected

Default status
unknown

Any version before V4.0.5016
affected

Default status
unknown

Any version before V3.2.6601
affected

Default status
unknown

Any version before V4.2.5015
affected

Default status
unknown

Any version before V3.0.0
affected

References

https://cert-portal.siemens.com/productcert/html/ssa-225840.html

https://cert-portal.siemens.com/productcert/html/ssa-953710.html

cve.org CVE-2024-22039

nvd.nist.gov CVE-2024-22039

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.