THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-22040

Assignersiemens
Reserved2024-01-04
Published2024-03-12
Updated2024-06-04

Description

A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems insufficiently validates HMAC values which might result in a buffer overread. This could allow an unauthenticated remote attacker to crash the network service.



HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C

Problem types

CWE-125: Out-of-bounds Read

Product status

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before IP8 SR4
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V4.3.5618
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V4.3.5617
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before V4.3.0001
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before V4.3.0001
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before MP8 SR4
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V4.3.5618
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V4.3.5617
affected

Default status
unknown

Any version before *
affected

References

https://cert-portal.siemens.com/productcert/html/ssa-225840.html

https://cert-portal.siemens.com/productcert/html/ssa-953710.html

cve.org CVE-2024-22040

nvd.nist.gov CVE-2024-22040

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-22040
© Copyright 2024 THREATINT. Made in Cyprus with +