We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-22041



Description

A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems improperly handles memory buffers when parsing X.509 certificates. This could allow an unauthenticated remote attacker to crash the network service.

Reserved 2024-01-04 | Published 2024-03-12 | Updated 2024-08-01 | Assigner siemens


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C

Problem types

CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer

Product status

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before IP8 SR4
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V4.3.5618
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V4.3.5617
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before V4.3.0001
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before MP4
affected

Default status
unknown

Any version before V4.3.0001
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before MP8 SR4
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V4.3.5618
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V4.3.5617
affected

Default status
unknown

Any version before *
affected

References

cert-portal.siemens.com/productcert/html/ssa-225840.html

cert-portal.siemens.com/productcert/html/ssa-953710.html

cve.org (CVE-2024-22041)

nvd.nist.gov (CVE-2024-22041)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-22041

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.