QID 590746

Date Published: 2022-07-29

QID 590746: Siemens Nucleus RTOS Transmission Control Protocol/Internet Protocol (TCP/IP) Stack Multiple Vulnerabilities (SSA-114589)

AFFECTED PRODUCTS
The following products and versions of the Nucleus RTOS are affected:
APOGEE MBC (PPC) (BACnet): All versions
APOGEE MBC (PPC) (P2 Ethernet): All versions
APOGEE MEC (PPC) (BACnet): All versions
APOGEE MEC (PPC) (P2 Ethernet): All versions
APOGEE PXC Compact (BACnet): All versions
APOGEE PXC Compact (P2 Ethernet): All versions
APOGEE PXC Modular (BACnet): All versions
APOGEE PXC Modular (P2 Ethernet): All versions

QID Detection Logic (Authenticated):
QID checks for the Vulnerable version of using passive scanning

Successful exploitation of these vulnerabilities could cause a denial-of-service condition, allow an information leakage, or remote code execution.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    The vendor is planning to release fixes soon.
    Customers are advised to refer to CERT MITIGATIONS section SSA-114589 for affected packages and patching details.
    Software Advisories
    Advisory ID Software Component Link
    SSA-114589 URL Logo cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf