Siemens APOGEE and TALON
APOGEE PXC and TALON TC field panels contain multiple vulnerabilities that could allow authenticated attackers to escalate privileges and compromise system integrity. The vulnerabilities include: (1) CVE-2022-45937, a privilege management flaw allowing low-privilege authenticated users to gain high-privilege access; (2) CVE-2020-28388, predictable TCP/IP Initial Sequence Numbers in the Nucleus RTOS kernel used by these devices; and (3) multiple DNS implementation flaws in the Nucleus RTOS. Affected versions are BACnet models before V3.5.5 and P2 Ethernet models before V2.8.20.
- Valid low-privilege user account credentials to access the field panel
- Network connectivity to the field panel (same network segment for TCP sequence number exploitation)
- Knowledge of or ability to predict TCP sequence numbers for connection hijacking
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e9e344be-fe0f-4566-a83b-14089de90925Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.