First published: Mon Oct 23 2017(Updated: )
A vulnerability has been identified in Siemens APOGEE PXC and TALON TC BACnet Automation Controllers in all versions <V3.5. A directory traversal vulnerability could allow a remote attacker with network access to the integrated web server (80/tcp and 443/tcp) to obtain information on the structure of the file system of the affected devices.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens APOGEE PXC Modular | <3.5 | |
Siemens APOGEE PXC Modular | ||
Siemens APOGEE Modular Building Controller Firmware | <3.5 | |
Siemens APOGEE PXC Modular (P2 Ethernet) | ||
Siemens TALON TC | <3.5 | |
Siemens TALON TC | ||
Siemens TALON TC | <3.5 | |
Siemens TALON TC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9947 is considered a critical vulnerability that can be exploited by remote attackers.
To fix CVE-2017-9947, upgrade the affected Siemens APOGEE PXC and TALON TC controllers to firmware version 3.5 or later.
CVE-2017-9947 affects Siemens APOGEE PXC and TALON TC BACnet Automation Controllers with versions prior to 3.5.
Yes, CVE-2017-9947 can be exploited remotely by an attacker with network access to the affected integrated web server.
CVE-2017-9947 is a directory traversal vulnerability that allows unauthorized access to information on the web server.