Siemens APOGEE/TALON Field Panels
A session handling vulnerability in multiple Siemens industrial control and building automation products allows an attacker with network access to hijack existing user sessions or spoof new sessions. Affected products include APOGEE PXC field panels (P2 Ethernet and BACnet variants), TALON TC Series panels, Calibre ICE, Mcenter, SCALANCE X-200RNA switches, SICAM GridPass, and SIMATIC RTLS Locating Manager. Successful exploitation could allow unauthorized access to these systems without valid credentials. The vulnerability affects authentication and session management across multiple product families used in energy sector infrastructure.
- Network access to the device (local network or Internet-exposed)
- No authentication credentials required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/867a97b6-b190-454b-ab58-2c1c3088a5f6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.