2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-45937" ,
"sourceIdentifier" : "productcert@siemens.com" ,
"published" : "2022-12-13T16:15:24.893" ,
2023-08-08 12:00:32 +00:00
"lastModified" : "2023-08-08T10:15:12.850" ,
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
2023-08-08 12:00:32 +00:00
"value" : "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). A low privilege authenticated attacker with network access to the integrated web server could download sensitive information from the device containing user account credentials."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
2023-08-08 12:00:32 +00:00
} ,
{
"source" : "productcert@siemens.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
2023-04-24 12:24:31 +02:00
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
} ,
{
"source" : "productcert@siemens.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-284"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:pxc00-e96.a_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.5" ,
"matchCriteriaId" : "36D6C5AE-A54D-40D3-8FDB-9AEC7BB67509"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:pxc00-e96.a:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B2624AC-FC87-4B7E-89B0-972161B87CCC"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:pxc100-e96.a_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.5" ,
"matchCriteriaId" : "084EC3F3-9BA9-49ED-B04A-743ED81BCC74"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:pxc100-e96.a:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17095896-BE92-40F2-9A56-068F7809A2B8"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:pxx-485.3_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.5" ,
"matchCriteriaId" : "ADC7B13D-B952-43A1-B008-E9636D78A838"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:pxx-485.3:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4978F643-D24A-49C7-B5A0-A1A7D8D7D5A8"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:pxc16.2-pe.a_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.8.20" ,
"matchCriteriaId" : "7437B8B9-D3DD-4C2C-AE21-2195FE30BD77"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:pxc16.2-pe.a:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DBCBEA25-E09B-4FAF-A168-9141A84C711D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:pxc24.2-pe.a_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.8.20" ,
"matchCriteriaId" : "493C8A07-DBD7-40CA-B4EE-AF508FB4C67A"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:pxc24.2-pe.a:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2CC32D0E-F2AB-4DA5-A191-05EDDF71DEB3"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:pxc24.2-pef.a_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.8.20" ,
"matchCriteriaId" : "DFF0FB32-E711-4452-AD95-E101863C618F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:pxc24.2-pef.a:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B36804FA-89A9-4696-B255-800FC6AF7592"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:pxc24.2-per.a_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.8.20" ,
"matchCriteriaId" : "0D247CB1-730F-44C1-AD2C-F770981A42B6"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:pxc24.2-per.a:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC5CD83F-1971-47BE-8144-7FD8BACD7149"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:pxc24.2-perf.a_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.8.20" ,
"matchCriteriaId" : "B3830835-7A93-4279-8FEC-1D4ABF968AC5"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:pxc24.2-perf.a:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8058F06A-2C05-4109-ACB0-F41701D76648"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:talon_tc_modular_\\(bacnet\\)_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.5" ,
"matchCriteriaId" : "283C1476-EACB-4644-817D-979246092BBE"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:talon_tc_modular_\\(bacnet\\):-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2ECD8AD9-E206-41B5-8CD4-F39DA3B4CE05"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" ,
"source" : "productcert@siemens.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
}
]
}