First published: Mon Oct 23 2017(Updated: )
A vulnerability has been identified in Siemens APOGEE PXC and TALON TC BACnet Automation Controllers in all versions <V3.5. An attacker with network access to the integrated web server (80/tcp and 443/tcp) could bypass the authentication and download sensitive information from the device.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens APOGEE PXC Modular | <3.5 | |
Siemens APOGEE PXC Modular | ||
Siemens APOGEE Modular Building Controller Firmware | <3.5 | |
siemens APOGEE PXC Modular (bacnet) | ||
Siemens TALON TC | <3.5 | |
Siemens TALON TC | ||
Siemens TALON TC | <3.5 | |
Siemens TALON TC Modular firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9946 has been rated as a high severity vulnerability due to its potential for bypassing authentication.
To mitigate CVE-2017-9946, update the Siemens APOGEE PXC and TALON TC devices to version 3.5 or later.
CVE-2017-9946 affects all versions of Siemens APOGEE PXC and TALON TC BACnet Automation Controllers prior to version 3.5.
Yes, CVE-2017-9946 can be exploited remotely by attackers with network access to the integrated web server on ports 80/tcp and 443/tcp.
An attacker exploiting CVE-2017-9946 could download sensitive information from the vulnerable device.