{"id": "CVE-2022-45937", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "productcert@siemens.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2022-12-13T16:15:24.893", "references": [{"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf", "tags": ["Patch", "Vendor Advisory"], "source": "productcert@siemens.com"}, {"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "productcert@siemens.com", "description": [{"lang": "en", "value": "CWE-284"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). A low privilege authenticated attacker with network access to the integrated web server could download sensitive information from the device containing user account credentials."}, {"lang": "es", "value": "Se ha identificado una vulnerabilidad en:\nAPOGEE PXC Compact (BACnet) (Todas las versiones < V3.5.5), \nAPOGEE PXC Compact (P2 Ethernet) (Todas las versiones < V2.8.20), \nAPOGEE PXC Modular (BACnet) (Todas las versiones < V3.5.5), \nAPOGEE PXC Modular (P2 Ethernet) (Todas las versiones < V2.8.20), \nTALON TC Compact (BACnet) (Todas las versiones < V3.5.5), \nTALON TC Modular (BACnet) (Todas las versiones < V3 .5.5). \nUn atacante autenticado con privilegios bajos y acceso a la red del servidor web integrado podr\u00eda descargar informaci\u00f3n confidencial del dispositivo que contenga las credenciales de la cuenta de usuario."}], "lastModified": "2024-11-21T07:30:00.073", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:pxc00-e96.a_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36D6C5AE-A54D-40D3-8FDB-9AEC7BB67509", "versionEndExcluding": "3.5.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:pxc00-e96.a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6B2624AC-FC87-4B7E-89B0-972161B87CCC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:pxc100-e96.a_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "084EC3F3-9BA9-49ED-B04A-743ED81BCC74", "versionEndExcluding": "3.5.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:pxc100-e96.a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "17095896-BE92-40F2-9A56-068F7809A2B8"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:pxx-485.3_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADC7B13D-B952-43A1-B008-E9636D78A838", "versionEndExcluding": "3.5.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:pxx-485.3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4978F643-D24A-49C7-B5A0-A1A7D8D7D5A8"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:pxc16.2-pe.a_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7437B8B9-D3DD-4C2C-AE21-2195FE30BD77", "versionEndExcluding": "2.8.20"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:pxc16.2-pe.a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DBCBEA25-E09B-4FAF-A168-9141A84C711D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:pxc24.2-pe.a_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "493C8A07-DBD7-40CA-B4EE-AF508FB4C67A", "versionEndExcluding": "2.8.20"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:pxc24.2-pe.a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CC32D0E-F2AB-4DA5-A191-05EDDF71DEB3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:pxc24.2-pef.a_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFF0FB32-E711-4452-AD95-E101863C618F", "versionEndExcluding": "2.8.20"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:pxc24.2-pef.a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B36804FA-89A9-4696-B255-800FC6AF7592"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:pxc24.2-per.a_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D247CB1-730F-44C1-AD2C-F770981A42B6", "versionEndExcluding": "2.8.20"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:pxc24.2-per.a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BC5CD83F-1971-47BE-8144-7FD8BACD7149"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:pxc24.2-perf.a_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3830835-7A93-4279-8FEC-1D4ABF968AC5", "versionEndExcluding": "2.8.20"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:pxc24.2-perf.a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8058F06A-2C05-4109-ACB0-F41701D76648"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:talon_tc_modular_\\(bacnet\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "283C1476-EACB-4644-817D-979246092BBE", "versionEndExcluding": "3.5.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:talon_tc_modular_\\(bacnet\\):-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2ECD8AD9-E206-41B5-8CD4-F39DA3B4CE05"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "productcert@siemens.com"}