Siemens Nucleus RTOS-based APOGEE and TALON Products (Update C)
Multiple vulnerabilities (NUCLEUS:13) in the Nucleus RTOS used by Siemens APOGEE, TALON, and Desigo building automation controllers. These include memory corruption flaws (buffer overflows, out-of-bounds access), integer overflows, and input validation errors in DHCP, FTP, and other protocol implementations. An attacker with network access can send crafted protocol packets to trigger code execution or denial of service. Siemens has released patches for most recent product lines but has no fixes available for end-of-life APOGEE MBC/MEC (PPC) models.
- Network access to the device (port 67 for DHCP, port 21 for FTP, or other affected protocol ports)
- No authentication required—vulnerabilities are in protocol parsing before credential checks
- Device must be running a vulnerable Nucleus RTOS version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/79c2c975-09d7-4534-b7ea-6b3be67b03d2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.