Siemens APOGEE and TALON
A buffer overflow vulnerability exists in the integrated web server of APOGEE MBC, MEC, PXC (Compact and Modular) and TALON TC (Compact and Modular) devices when configured for P2 Ethernet or BACnet protocols. The vulnerability allows remote code execution with root privileges without authentication. Siemens has released firmware version 3.5.3 for BACnet variants of PXC and TALON TC devices. However, no fixes are available for APOGEE MBC, MEC, or the P2 Ethernet variants of PXC and TALON TC. Siemens recommends disabling the web server, restricting access to ports 80 and 443 to trusted addresses, and implementing network segmentation as compensating controls.
- Network reachability to the device on port 80/TCP or 443/TCP
- Device running a vulnerable firmware version
- Web server enabled (default state)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/af00b051-e7a0-4843-b900-531854ee7460Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.