Action not permitted
Modal body text goes here.
Modal Title
Modal Body
GHSA-P429-8J49-F6X5
Vulnerability from github – Published: 2024-03-12 12:30 – Updated: 2024-05-14 18:30A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions < IP8), Cerberus PRO EN Fire Panel FC72x (All versions < IP8), Cerberus PRO EN X200 Cloud Distribution (All versions < V4.0.5016), Cerberus PRO EN X300 Cloud Distribution (All versions < V4.2.5015), Sinteso FS20 EN Engineering Tool (All versions < MP8), Sinteso FS20 EN Fire Panel FC20 (All versions < MP8), Sinteso FS20 EN X200 Cloud Distribution (All versions < V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution (All versions < V4.2.5015), Sinteso Mobile (All versions < V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow. This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges.
{
"affected": [],
"aliases": [
"CVE-2024-22039"
],
"database_specific": {
"cwe_ids": [
"CWE-120"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-03-12T11:15:48Z",
"severity": "CRITICAL"
},
"details": "A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions \u003c IP8), Cerberus PRO EN Fire Panel FC72x (All versions \u003c IP8), Cerberus PRO EN X200 Cloud Distribution (All versions \u003c V4.0.5016), Cerberus PRO EN X300 Cloud Distribution (All versions \u003c V4.2.5015), Sinteso FS20 EN Engineering Tool (All versions \u003c MP8), Sinteso FS20 EN Fire Panel FC20 (All versions \u003c MP8), Sinteso FS20 EN X200 Cloud Distribution (All versions \u003c V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution (All versions \u003c V4.2.5015), Sinteso Mobile (All versions \u003c V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow.\nThis could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges.",
"id": "GHSA-p429-8j49-f6x5",
"modified": "2024-05-14T18:30:34Z",
"published": "2024-03-12T12:30:48Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22039"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-225840.html"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-953710.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CVE-2024-22039 (GCVE-0-2024-22039)
Vulnerability from cvelistv5 – Published: 2024-03-12 10:21 – Updated: 2024-08-01 22:35- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:siemens:cerberus_pro_en_engineering_tool:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "cerberus_pro_en_engineering_tool",
"vendor": "siemens",
"versions": [
{
"status": "affected",
"version": "-"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:cerberus_pro_en_fire_panel_fc72x:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "cerberus_pro_en_fire_panel_fc72x",
"vendor": "siemens",
"versions": [
{
"status": "affected",
"version": "-"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:cerberus_pro_en_x300_cloud_distribution:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "cerberus_pro_en_x300_cloud_distribution",
"vendor": "siemens",
"versions": [
{
"status": "affected",
"version": "-"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:cerberus_pro_ul_compact_panel:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "cerberus_pro_ul_compact_panel",
"vendor": "siemens",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:cerberus_pro_en_x200_cloud_distribution:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "cerberus_pro_en_x200_cloud_distribution",
"vendor": "siemens",
"versions": [
{
"status": "affected",
"version": "-"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:cerberus_pro_ul_engineering_tool:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "cerberus_pro_ul_engineering_tool",
"vendor": "siemens",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:cerberus_pro_ul_x300_cloud:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "cerberus_pro_ul_x300_cloud",
"vendor": "siemens",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:desigo_fire_safety_ul_compact_panel:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "desigo_fire_safety_ul_compact_panel",
"vendor": "siemens",
"versions": [
{
"lessThan": "mp4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:desigo_fire_safety_ul_engineering_tool:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "desigo_fire_safety_ul_engineering_tool",
"vendor": "siemens",
"versions": [
{
"lessThan": "v4.3.0001",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:sinteso_fs20_en_fire_panel_fc20:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sinteso_fs20_en_fire_panel_fc20",
"vendor": "siemens",
"versions": [
{
"status": "affected",
"version": "-"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:sinteso_fs20_en_x200_cloud_distribution:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sinteso_fs20_en_x200_cloud_distribution",
"vendor": "siemens",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:sinteso_fs20_en_x300_cloud_distribution:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sinteso_fs20_en_x300_cloud_distribution",
"vendor": "siemens",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"cpes": [
"cpe:2.3:a:siemens:sinteso_mobile:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sinteso_mobile",
"vendor": "siemens",
"versions": [
{
"status": "affected",
"version": "*"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-22039",
"options": [
{
"Exploitation": "None"
},
{
"Automatable": "Yes"
},
{
"Technical Impact": "Total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-16T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:52:53.328Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:35:34.899Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-225840.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-953710.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cerberus PRO EN Engineering Tool",
"vendor": "Siemens",
"versions": [
{
"lessThan": "IP8",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cerberus PRO EN Fire Panel FC72x IP6",
"vendor": "Siemens",
"versions": [
{
"lessThan": "IP6 SR3",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cerberus PRO EN Fire Panel FC72x IP7",
"vendor": "Siemens",
"versions": [
{
"lessThan": "IP7 SR5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cerberus PRO EN X200 Cloud Distribution IP7",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V3.0.6602",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cerberus PRO EN X200 Cloud Distribution IP8",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V4.0.5016",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cerberus PRO EN X300 Cloud Distribution IP7",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V3.2.6601",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cerberus PRO EN X300 Cloud Distribution IP8",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V4.2.5015",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cerberus PRO UL Compact Panel FC922/924",
"vendor": "Siemens",
"versions": [
{
"lessThan": "MP4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cerberus PRO UL Engineering Tool",
"vendor": "Siemens",
"versions": [
{
"lessThan": "MP4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cerberus PRO UL X300 Cloud Distribution",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V4.3.0001",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Desigo Fire Safety UL Compact Panel FC2025/2050",
"vendor": "Siemens",
"versions": [
{
"lessThan": "MP4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Desigo Fire Safety UL Engineering Tool",
"vendor": "Siemens",
"versions": [
{
"lessThan": "MP4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Desigo Fire Safety UL X300 Cloud Distribution",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V4.3.0001",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Sinteso FS20 EN Engineering Tool",
"vendor": "Siemens",
"versions": [
{
"lessThan": "MP8",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Sinteso FS20 EN Fire Panel FC20 MP6",
"vendor": "Siemens",
"versions": [
{
"lessThan": "MP6 SR3",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Sinteso FS20 EN Fire Panel FC20 MP7",
"vendor": "Siemens",
"versions": [
{
"lessThan": "MP7 SR5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Sinteso FS20 EN X200 Cloud Distribution MP7",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V3.0.6602",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Sinteso FS20 EN X200 Cloud Distribution MP8",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V4.0.5016",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Sinteso FS20 EN X300 Cloud Distribution MP7",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V3.2.6601",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Sinteso FS20 EN X300 Cloud Distribution MP8",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V4.2.5015",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Sinteso Mobile",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V3.0.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions \u003c IP8), Cerberus PRO EN Fire Panel FC72x IP6 (All versions \u003c IP6 SR3), Cerberus PRO EN Fire Panel FC72x IP7 (All versions \u003c IP7 SR5), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions \u003c V3.0.6602), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions \u003c V4.0.5016), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions \u003c V3.2.6601), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions \u003c V4.2.5015), Cerberus PRO UL Compact Panel FC922/924 (All versions \u003c MP4), Cerberus PRO UL Engineering Tool (All versions \u003c MP4), Cerberus PRO UL X300 Cloud Distribution (All versions \u003c V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions \u003c MP4), Desigo Fire Safety UL Engineering Tool (All versions \u003c MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions \u003c V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions \u003c MP8), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions \u003c MP6 SR3), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions \u003c MP7 SR5), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions \u003c V3.0.6602), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions \u003c V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions \u003c V3.2.6601), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions \u003c V4.2.5015), Sinteso Mobile (All versions \u003c V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow.\r\nThis could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 10,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-15T07:23:51.702Z",
"orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"shortName": "siemens"
},
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-225840.html"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-953710.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"assignerShortName": "siemens",
"cveId": "CVE-2024-22039",
"datePublished": "2024-03-12T10:21:53.634Z",
"dateReserved": "2024-01-04T13:24:07.552Z",
"dateUpdated": "2024-08-01T22:35:34.899Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.