Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-p429-8j49-f6x5
Vulnerability from github
A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions < IP8), Cerberus PRO EN Fire Panel FC72x (All versions < IP8), Cerberus PRO EN X200 Cloud Distribution (All versions < V4.0.5016), Cerberus PRO EN X300 Cloud Distribution (All versions < V4.2.5015), Sinteso FS20 EN Engineering Tool (All versions < MP8), Sinteso FS20 EN Fire Panel FC20 (All versions < MP8), Sinteso FS20 EN X200 Cloud Distribution (All versions < V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution (All versions < V4.2.5015), Sinteso Mobile (All versions < V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow. This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges.
{ "affected": [], "aliases": [ "CVE-2024-22039" ], "database_specific": { "cwe_ids": [ "CWE-120" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-03-12T11:15:48Z", "severity": "CRITICAL" }, "details": "A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions \u003c IP8), Cerberus PRO EN Fire Panel FC72x (All versions \u003c IP8), Cerberus PRO EN X200 Cloud Distribution (All versions \u003c V4.0.5016), Cerberus PRO EN X300 Cloud Distribution (All versions \u003c V4.2.5015), Sinteso FS20 EN Engineering Tool (All versions \u003c MP8), Sinteso FS20 EN Fire Panel FC20 (All versions \u003c MP8), Sinteso FS20 EN X200 Cloud Distribution (All versions \u003c V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution (All versions \u003c V4.2.5015), Sinteso Mobile (All versions \u003c V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow.\nThis could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges.", "id": "GHSA-p429-8j49-f6x5", "modified": "2024-05-14T18:30:34Z", "published": "2024-03-12T12:30:48Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22039" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/html/ssa-225840.html" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/html/ssa-953710.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
cve-2024-22039
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:siemens:cerberus_pro_en_engineering_tool:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cerberus_pro_en_engineering_tool", "vendor": "siemens", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:a:siemens:cerberus_pro_en_fire_panel_fc72x:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cerberus_pro_en_fire_panel_fc72x", "vendor": "siemens", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:a:siemens:cerberus_pro_en_x300_cloud_distribution:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cerberus_pro_en_x300_cloud_distribution", "vendor": "siemens", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:a:siemens:cerberus_pro_ul_compact_panel:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cerberus_pro_ul_compact_panel", "vendor": "siemens", "versions": [ { "status": "affected", "version": "*" } ] }, { "cpes": [ "cpe:2.3:a:siemens:cerberus_pro_en_x200_cloud_distribution:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cerberus_pro_en_x200_cloud_distribution", "vendor": "siemens", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:a:siemens:cerberus_pro_ul_engineering_tool:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cerberus_pro_ul_engineering_tool", "vendor": "siemens", "versions": [ { "status": "affected", "version": "*" } ] }, { "cpes": [ "cpe:2.3:a:siemens:cerberus_pro_ul_x300_cloud:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cerberus_pro_ul_x300_cloud", "vendor": "siemens", "versions": [ { "status": "affected", "version": "*" } ] }, { "cpes": [ "cpe:2.3:a:siemens:desigo_fire_safety_ul_compact_panel:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "desigo_fire_safety_ul_compact_panel", "vendor": "siemens", "versions": [ { "lessThan": "mp4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:desigo_fire_safety_ul_engineering_tool:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "desigo_fire_safety_ul_engineering_tool", "vendor": "siemens", "versions": [ { "lessThan": "v4.3.0001", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:sinteso_fs20_en_fire_panel_fc20:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sinteso_fs20_en_fire_panel_fc20", "vendor": "siemens", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:a:siemens:sinteso_fs20_en_x200_cloud_distribution:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sinteso_fs20_en_x200_cloud_distribution", "vendor": "siemens", "versions": [ { "status": "affected", "version": "*" } ] }, { "cpes": [ "cpe:2.3:a:siemens:sinteso_fs20_en_x300_cloud_distribution:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sinteso_fs20_en_x300_cloud_distribution", "vendor": "siemens", "versions": [ { "status": "affected", "version": "*" } ] }, { "cpes": [ "cpe:2.3:a:siemens:sinteso_mobile:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sinteso_mobile", "vendor": "siemens", "versions": [ { "status": "affected", "version": "*" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22039", "options": [ { "Exploitation": "None" }, { "Automatable": "Yes" }, { "Technical Impact": "Total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:52:53.328Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-225840.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-953710.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cerberus PRO EN Engineering Tool", "vendor": "Siemens", "versions": [ { "lessThan": "IP8", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Cerberus PRO EN Fire Panel FC72x IP6", "vendor": "Siemens", "versions": [ { "lessThan": "IP6 SR3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Cerberus PRO EN Fire Panel FC72x IP7", "vendor": "Siemens", "versions": [ { "lessThan": "IP7 SR5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Cerberus PRO EN X200 Cloud Distribution IP7", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.6602", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Cerberus PRO EN X200 Cloud Distribution IP8", "vendor": "Siemens", "versions": [ { "lessThan": "V4.0.5016", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Cerberus PRO EN X300 Cloud Distribution IP7", "vendor": "Siemens", "versions": [ { "lessThan": "V3.2.6601", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Cerberus PRO EN X300 Cloud Distribution IP8", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.5015", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Cerberus PRO UL Compact Panel FC922/924", "vendor": "Siemens", "versions": [ { "lessThan": "MP4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Cerberus PRO UL Engineering Tool", "vendor": "Siemens", "versions": [ { "lessThan": "MP4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Cerberus PRO UL X300 Cloud Distribution", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.0001", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Desigo Fire Safety UL Compact Panel FC2025/2050", "vendor": "Siemens", "versions": [ { "lessThan": "MP4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Desigo Fire Safety UL Engineering Tool", "vendor": "Siemens", "versions": [ { "lessThan": "MP4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Desigo Fire Safety UL X300 Cloud Distribution", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.0001", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Sinteso FS20 EN Engineering Tool", "vendor": "Siemens", "versions": [ { "lessThan": "MP8", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Sinteso FS20 EN Fire Panel FC20 MP6", "vendor": "Siemens", "versions": [ { "lessThan": "MP6 SR3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Sinteso FS20 EN Fire Panel FC20 MP7", "vendor": "Siemens", "versions": [ { "lessThan": "MP7 SR5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Sinteso FS20 EN X200 Cloud Distribution MP7", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.6602", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Sinteso FS20 EN X200 Cloud Distribution MP8", "vendor": "Siemens", "versions": [ { "lessThan": "V4.0.5016", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Sinteso FS20 EN X300 Cloud Distribution MP7", "vendor": "Siemens", "versions": [ { "lessThan": "V3.2.6601", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Sinteso FS20 EN X300 Cloud Distribution MP8", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.5015", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Sinteso Mobile", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions \u003c IP8), Cerberus PRO EN Fire Panel FC72x IP6 (All versions \u003c IP6 SR3), Cerberus PRO EN Fire Panel FC72x IP7 (All versions \u003c IP7 SR5), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions \u003c V3.0.6602), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions \u003c V4.0.5016), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions \u003c V3.2.6601), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions \u003c V4.2.5015), Cerberus PRO UL Compact Panel FC922/924 (All versions \u003c MP4), Cerberus PRO UL Engineering Tool (All versions \u003c MP4), Cerberus PRO UL X300 Cloud Distribution (All versions \u003c V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions \u003c MP4), Desigo Fire Safety UL Engineering Tool (All versions \u003c MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions \u003c V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions \u003c MP8), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions \u003c MP6 SR3), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions \u003c MP7 SR5), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions \u003c V3.0.6602), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions \u003c V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions \u003c V3.2.6601), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions \u003c V4.2.5015), Sinteso Mobile (All versions \u003c V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow.\r\nThis could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges." } ], "metrics": [ { "cvssV3_1": { "baseScore": 10, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T07:23:51.702Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-225840.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-953710.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-22039", "datePublished": "2024-03-12T10:21:53.634Z", "dateReserved": "2024-01-04T13:24:07.552Z", "dateUpdated": "2024-08-01T22:35:34.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.