CVE-2021-27391
Vulnerability from cvelistv5
Published
2021-09-14 10:47
Modified
2024-08-03 20:48
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in APOGEE MBC (PPC) (P2 Ethernet) (All versions >= V2.6.3), APOGEE MEC (PPC) (P2 Ethernet) (All versions >= V2.6.3), APOGEE PXC Compact (BACnet) (All versions < V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions >= V2.8), APOGEE PXC Modular (BACnet) (All versions < V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions >= V2.8), TALON TC Compact (BACnet) (All versions < V3.5.3), TALON TC Modular (BACnet) (All versions < V3.5.3). The web server of affected devices lacks proper bounds checking when parsing the Host parameter in HTTP requests, which could lead to a buffer overflow. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on the device with root privileges.
References
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-944498.pdf | Patch, Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:48:16.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-944498.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "APOGEE MBC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.6.3" } ] }, { "product": "APOGEE MEC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.6.3" } ] }, { "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.3" } ] }, { "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.8" } ] }, { "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.3" } ] }, { "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.8" } ] }, { "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.3" } ] }, { "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (P2 Ethernet) (All versions \u003e= V2.6.3), APOGEE MEC (PPC) (P2 Ethernet) (All versions \u003e= V2.6.3), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions \u003e= V2.8), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions \u003e= V2.8), TALON TC Compact (BACnet) (All versions \u003c V3.5.3), TALON TC Modular (BACnet) (All versions \u003c V3.5.3). The web server of affected devices lacks proper bounds checking when parsing the Host parameter in HTTP requests, which could lead to a buffer overflow. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on the device with root privileges." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-14T10:47:31", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-944498.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-27391", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "APOGEE MBC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.6.3" } ] } }, { "product_name": "APOGEE MEC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.6.3" } ] } }, { "product_name": "APOGEE PXC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.3" } ] } }, { "product_name": "APOGEE PXC Compact (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.8" } ] } }, { "product_name": "APOGEE PXC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.3" } ] } }, { "product_name": "APOGEE PXC Modular (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.8" } ] } }, { "product_name": "TALON TC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.3" } ] } }, { "product_name": "TALON TC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.3" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (P2 Ethernet) (All versions \u003e= V2.6.3), APOGEE MEC (PPC) (P2 Ethernet) (All versions \u003e= V2.6.3), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions \u003e= V2.8), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions \u003e= V2.8), TALON TC Compact (BACnet) (All versions \u003c V3.5.3), TALON TC Modular (BACnet) (All versions \u003c V3.5.3). The web server of affected devices lacks proper bounds checking when parsing the Host parameter in HTTP requests, which could lead to a buffer overflow. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on the device with root privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-944498.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-944498.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-27391", "datePublished": "2021-09-14T10:47:31", "dateReserved": "2021-02-18T00:00:00", "dateUpdated": "2024-08-03T20:48:16.974Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-27391\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2021-09-14T11:15:23.913\",\"lastModified\":\"2021-09-28T16:24:02.287\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in APOGEE MBC (PPC) (P2 Ethernet) (All versions \u003e= V2.6.3), APOGEE MEC (PPC) (P2 Ethernet) (All versions \u003e= V2.6.3), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions \u003e= V2.8), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions \u003e= V2.8), TALON TC Compact (BACnet) (All versions \u003c V3.5.3), TALON TC Modular (BACnet) (All versions \u003c V3.5.3). The web server of affected devices lacks proper bounds checking when parsing the Host parameter in HTTP requests, which could lead to a buffer overflow. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on the device with root privileges.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en APOGEE MBC (PPC) (P2 Ethernet) (Todas las versiones posteriores a V2.6.3, incluy\u00e9ndola), APOGEE MEC (PPC) (P2 Ethernet) (Todas las versiones posteriores a V2.6.3, incluy\u00e9ndola), APOGEE PXC Compact (BACnet) (Todas las versiones anteriores a V3.5.3), APOGEE PXC Compact (P2 Ethernet) (Todas las versiones posteriores a V2.8, incluy\u00e9ndola), APOGEE PXC Modular (BACnet) (Todas las versiones anteriores a V3.5.3), APOGEE PXC Modular (P2 Ethernet) (Todas las versiones posteriores a V2.8, incluy\u00e9ndola), TALON TC Compact (BACnet) (Todas las versiones anteriores a V3.5.3), TALON TC Modular (BACnet) (Todas las versiones anteriores a V3.5.3). El servidor web de los dispositivos afectados carece de una comprobaci\u00f3n de l\u00edmites apropiada cuando analiza el par\u00e1metro Host en las peticiones HTTP, que podr\u00eda conllevar un desbordamiento del b\u00fafer. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el dispositivo con privilegios de root\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":10.0},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:apogee_mbc_\\\\(ppc\\\\)_\\\\(p2_ethernet\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.3\",\"matchCriteriaId\":\"31740BC7-0AA1-407C-A09A-80F5F988B622\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:apogee_mbc_\\\\(ppc\\\\)_\\\\(p2_ethernet\\\\):*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DCA333D-E244-474C-85A1-28D58BD52B9A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:apogee_mec_\\\\(ppc\\\\)_\\\\(p2_ethernet\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.3\",\"matchCriteriaId\":\"10AE7480-2439-4C4F-A2A9-534ADB3465FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:apogee_mec_\\\\(ppc\\\\)_\\\\(p2_ethernet\\\\):*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C6D6BE1-3FBA-4CFB-BCB2-69CD32C2B66C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:apogee_pxc_bacnet_automation_controller_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.3\",\"matchCriteriaId\":\"6ED57DFE-CB12-4448-97C8-FA7E91F14270\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:apogee_pxc_bacnet_automation_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0CFFD37-F58F-48D3-A466-06CAAC8BD580\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:apogee_pxc_compact_\\\\(p2_ethernet\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.8\",\"matchCriteriaId\":\"8AB7990B-3DEF-4FB9-A577-63D5BFFA6FB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:apogee_pxc_compact_\\\\(p2_ethernet\\\\):*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86B37170-74CC-44A2-A069-C91E1B8A3877\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:apogee_pxc_modular_\\\\(bacnet\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.3\",\"matchCriteriaId\":\"68DB98DC-274A-403B-846A-0B3F54A1AC4A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:apogee_pxc_modular_\\\\(bacnet\\\\):*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63A8FFF6-EB8F-4159-B8E7-6619780EE5F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:apogee_pxc_modular_\\\\(p2_ethernet\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.8\",\"matchCriteriaId\":\"EC73A707-FD2E-4ACA-8F53-CE82033952B7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:apogee_pxc_modular_\\\\(p2_ethernet\\\\):*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78EE7A2C-2967-40E5-8485-D90E087F7885\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:talon_tc_compact_\\\\(bacnet\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.3\",\"matchCriteriaId\":\"6C746D61-2372-41AF-B074-1BE5B82418DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:talon_tc_compact_\\\\(bacnet\\\\):*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"173D1A0C-FCC9-454B-B701-57B1EB83473D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:talon_tc_modular_\\\\(bacnet\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.3\",\"matchCriteriaId\":\"E4755D15-F0E4-49D1-8176-4C7D7F5D5421\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:talon_tc_modular_\\\\(bacnet\\\\):*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8862F30B-F2C6-4B03-965D-36AC1F3B9490\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-944498.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.